US10872187B2 - Verified runtime validation of verified cyber-physical system models - Google Patents

Verified runtime validation of verified cyber-physical system models Download PDF

Info

Publication number
US10872187B2
US10872187B2 US15/026,690 US201415026690A US10872187B2 US 10872187 B2 US10872187 B2 US 10872187B2 US 201415026690 A US201415026690 A US 201415026690A US 10872187 B2 US10872187 B2 US 10872187B2
Authority
US
United States
Prior art keywords
monitor
model
cps
controller
verified
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active, expires
Application number
US15/026,690
Other versions
US20160253437A1 (en
Inventor
André Platzer
Stefan Mitsch
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Carnegie Mellon University
Original Assignee
Carnegie Mellon University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Carnegie Mellon University filed Critical Carnegie Mellon University
Priority to US15/026,690 priority Critical patent/US10872187B2/en
Assigned to CARNEGIE MELLON UNIVERSITY reassignment CARNEGIE MELLON UNIVERSITY ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: PLATZER, ANDRE, MITSCH, Stefan
Publication of US20160253437A1 publication Critical patent/US20160253437A1/en
Application granted granted Critical
Publication of US10872187B2 publication Critical patent/US10872187B2/en
Active legal-status Critical Current
Adjusted expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F30/00Computer-aided design [CAD]
    • G06F30/30Circuit design
    • G06F30/32Circuit design at the digital level
    • G06F30/33Design verification, e.g. functional simulation or model checking
    • G06F30/3323Design verification, e.g. functional simulation or model checking using formal methods, e.g. equivalence checking or property checking

Definitions

  • This invention pertains to the field of cyber-physical systems (CPS), and, in particular to models approximating the behavior of CPS and methods for monitoring the actual CPS that are based on the models.
  • CPS cyber-physical systems
  • CPS cyber-physical systems
  • CPS Cyber-physical systems
  • Validation i.e., checking whether a CPS implementation fits to a model, is an interesting but difficult problem.
  • CPS models are more difficult to analyze than ordinary (discrete) programs because of the physical plant, the environment, sensor inaccuracies, and actuator disturbance.
  • models are essential; but any model necessarily deviates from the real world. Still, good models can be correct within certain error margins.
  • ModelPlex a method to synthesize monitors by theorem proving.
  • the method uses sound proof rules to formally verify that a model is safe and to synthesize provably correct monitors that validate compliance of system executions with the model.
  • This invention performs runtime model validation. That is, validating whether a model, shown for example, in FIG. 3 as reference number 100 , which is assumed for verification purposes is adequate for a particular system execution to ensure that the verification results apply to the current execution.
  • the invention checks system execution with respect to a monitor specification 104 , and thus, belongs to the field of runtime verification.
  • runtime validation is used to clearly convey the purpose of monitoring. While “runtime verification” monitors properties without offline verification, “runtime validation” monitors model adequacy to transfer offline verification results.
  • the focus of the invention is on verifiably correct runtime validation to ensure that verified properties of models provably apply, which is important for safety and certification of CPS.
  • Checking whether a system execution fits to a verified model 12 includes checking that the actions chosen by the (unverified) controller implementation fit to one of the choices and requirements of the verified controller model. It also includes checking that the observed states can be explained by the plant model. The crucial questions are: How can a compliance monitor be synthesized that provably represents the verified model? How much safety margin does a system need to ensure that fail-safe actions are initiated early enough for the system to remain safe even if its behavior ceases to comply with the model?
  • the second question is related to feedback control and can only be answered when assuming constraints on the deviation of the real system dynamics from the plant model. Otherwise, if the real system can be infinitely far off from the model, safety guarantees are impossible.
  • constraints further enable compliance monitoring solely on the basis of sample points instead of the unobservable intermediate states about which no sensor data exists.
  • the method of the present invention still generates verifiably correct runtime tests, which detect deviation from the model at the sampling points, not just between them. A fail-safe action will then lead to best-effort mitigation of safety risks (rather than guaranteed safety).
  • ModelPlex uses theorem proving with sound proof rules to turn hybrid system models into monitors in a verifiably correct way. Upon non-compliance with the model, ModelPlex initiates provably safe fail-safe actions.
  • ModelPlex is a principle to build and verify high-assurance controllers for safety-critical computerized systems that interact physically with their environment. It guarantees that verification results about CPS models transfer to the real system by safeguarding against deviations from the verified model. Monitors created by ModelPlex are provably correct and check at runtime whether or not the actual behavior of a CPS complies with the verified model and its assumptions. Upon non-compliance, ModelPlex initiates fail-safe fallback strategies. To initiate the fallback strategies early enough, ModelPlex uses prediction on the basis of disturbed plant models to check safety for the next control cycle. This way, ModelPlex ensures that verification results about a model of a CPS transfer to the actual system behavior at runtime.
  • FIG. 1 shows the use of ModelPlex monitors along a system execution.
  • FIG. 2 show the water tank simulation using monitors
  • FIG. 3 is a high level flow chart of the process of deriving monitors from a model.
  • FIG. 4 is a flow chart of the “Analyze Monitor Specification” step of the process shown in FIG. 3
  • differential dynamic logic is used, which has a notation for hybrid systems as hybrid programs. allows us to make statements that we want to be true for all runs of a hybrid program ([ ⁇ ] ⁇ ) or for at least one run ⁇ ⁇ ) of a hybrid program.
  • Table 1 summarizes the relevant syntax fragment of hybrid programs together with an informal semantics.
  • the semantics ⁇ ( ⁇ ) of hybrid program ⁇ is a relation on initial and final states of running ⁇ .
  • Differential dynamic logic comes uses a theorem prover with a verification technique to prove correctness properties of hybrid programs.
  • a theorem prover and the one that is used in the preferred embodiment of the invention is KeYmaera.
  • Formula (1) expresses that all runs of the hybrid system ⁇ *, which start in states that satisfy the precondition ⁇ and repeat the model ⁇ arbitrarily many times, must end in states that satisfy the post condition ⁇ .
  • Formula (1) is proved using some form of induction, which shows that a loop invariant ⁇ holds after every run of ⁇ if it was true before.
  • the model ⁇ is a hybrid system model 100 of a CPS, which means that it describes both the discrete control actions of the controllers in the system and the continuous physics of the plant and the system's environment.
  • ModelPlex derives three kinds of monitors, a model monitor 20 , a controller monitor 22 , and a prediction monitor 24 . Reachability between consecutive states in ⁇ , ⁇ ctrl , and ⁇ ⁇ plant are checked by verifying states during execution against the corresponding monitor.
  • Model monitor 20 In each state v i the sample point v i ⁇ 1 from the previous execution ⁇ i ⁇ 1 is tested for deviation from the single ⁇ , not ⁇ * i. e., test (v i ⁇ 1 , v i ) ⁇ ( ⁇ ). If violated, other verified properties may no longer hold for the system. The system, however, is still safe if a prediction monitor 24 was satisfied on v i ⁇ 1 .Frequent violations indicate an inadequate model that should be revised to better reflect reality.
  • Controller monitor 22 In intermediate state ⁇ tilde over (v) ⁇ i the current controller decisions of the implementation ⁇ ctrl are tested for compliance with the model, i.e., test (v i , ⁇ tilde over (v) ⁇ i ) ⁇ ( ⁇ ctrl ). Controller monitors 22 are designed for switching between controllers similar to Simplex. If violated, the commands from a fail-safe controller replace the current controller's decisions to ensure that no unsafe commands are ever actuated.
  • Prediction monitor 24 In intermediate state ⁇ tilde over (v) ⁇ i the worst-case safety impact of the current controller decisions are tested with respect to the predictions of a bounded deviation plant model ⁇ ⁇ plant , which has a tolerance around the model plant ⁇ plant , i.e., check v i+1
  • ⁇ for all v i+1 such that ( ⁇ tilde over (v) ⁇ i , v i+1 ) ⁇ ( ⁇ ⁇ plant ). Note, that all v i+1 are simultaneously checked by checking ⁇ tilde over (v) ⁇ i for a characterizing condition of ⁇ ⁇ plant . If violated, the current control choice is not guaranteed to keep the system safe until the next control cycle and, thus, a fail-safe controller takes over.
  • the assumption for the prediction monitor 24 is that the real execution is not arbitrarily far off the plant models used for safety verification, because otherwise guarantees can neither be made on unobservable intermediate states nor on safety of the future system evolution.
  • a separation of disturbance causes in the models can be used: ideal plant models ⁇ plant for correctness verification purposes, implementation deviation plant models ⁇ ⁇ plant for monitoring purposes. Any deviation model (e.g., piecewise constant disturbance, differential inclusion models of disturbance) is supported, as long as the deviation is bounded and differential invariants can be found. It is assumed that monitor evaluations are at most some ⁇ time units apart (e.g., along with a recurring controller execution). Note that disturbance in ⁇ ⁇ plant is more manageable compared to ⁇ *, as single runs ⁇ can be focused on instead of repetitions for monitoring.
  • V is used to denote the set of variables whose state we want to recall.
  • the variables in x ⁇ can be used to recall this state.
  • Lemma 1 (Loop prior and posterior state).
  • be a hybrid program and ⁇ * be the program that repeats arbitrarily many times.
  • the sequence of states originates from an ⁇ * execution from Y V 0 to Y V n , i.e.,
  • Y V 31 ⁇ ⁇ * Y V + .
  • Lemma 1 enables us to check compliance with the model ⁇ * up to the current state by checking reachability of a posterior state from a prior state on each execution of ⁇ (i.e., online monitoring, which is easier because the loop was eliminated).
  • formula (2) which relates a prior state of a CPS to its posterior state through at least one path through the model ⁇ .
  • Consecutive states for ⁇ * mean before and after executions of ⁇ (i.e., ⁇ ; ⁇ ; ⁇ , not within ⁇ ).
  • Formula (2) is satisfied in a state v, if there is at least one run of the model ⁇ starting in the state v recalled by Y V ⁇ and which results in a state ⁇ recalled using Y V + .
  • at least one path through ⁇ explains how the prior state v got transformed into the posterior state ⁇ .
  • the formula (2) characterizes the state transition relation of the model ⁇ directly. Its violation witnesses compliance violation. Compliance at all intermediate states cannot be observed by real-world sensors. (See Section ‘Monitoring Compliance Guarantees for Unobservable Intermediate States’ herein).
  • formula (2) would be a monitor, because it relates a prior state to a posterior state through the model of a CPS, but the formula is difficult, if not impossible, to evaluate at runtime, because it refers to a hybrid system ⁇ , which includes non-determinism and differential equations.
  • which includes non-determinism and differential equations.
  • any formula that is equivalent to (2) but conceptually easier to evaluate in a state would be a correct monitor 112 .
  • the resulting first-order real arithmetic formula can be easily implemented in a runtime monitor and executed along with the actual controller.
  • a monitor 112 is executable code that only returns true if the transition from the prior system state to the posterior state is compliant with the model 100 . Thus, deviations from the model 100 can be detected at runtime, so that appropriate fallback and mitigation strategies can be initiated.
  • Remark 1 The complexity for evaluating an arithmetic formula over the reals for concrete numbers is linear in the formula size, as opposed to deciding the validity of such formulas, which is doubly exponential. Evaluating the same formula on floating point numbers is inexpensive, but may yield wrong results due to rounding errors; on exact rationals, the bit-complexity can be non-negligible. Interval arithmetic is used to obtain reliable results efficiently.
  • a simple water tank is used as a running example to illustrate the concepts throughout this section.
  • the water tank has a current level x and a maximum level m.
  • the water tank controller which runs at least every ⁇ time units, non-deterministically chooses any flow f between a maximum outflow ⁇ 1 and a maximum
  • ModelPlex monitor specifications introduces the nature of ModelPlex monitor specifications, the approach in this invention for generating such specifications from hybrid system models, and how to turn those specifications into monitor code that can be executed at runtime along with the controller.
  • a ModelPlex specification 104 corresponds to the formula (2). If the current state of a system does not satisfy a ModelPlex specification 104 , some behavior that is not reflected in the model 100 occurred (e.g., the wrong control action was taken, unanticipated dynamics in the environment occurred, sensor uncertainty led to unexpected values, or the system was applied outside the specified operating environment).
  • a model monitor X m checks that two consecutive states and can be explained by an execution of the model ⁇ , i.e., ( , ) ⁇ ( ⁇ ).
  • BV( ⁇ ) are bound variables in ⁇
  • FV ( ⁇ ) are free variables in ⁇
  • is the set of all variables
  • a ⁇ B denotes the set of variables being in some set A but not in some other set B.
  • A to denote v projected onto the variables in A.
  • ⁇ v m v k
  • const denotes the conditions of ⁇ that involve only constants that do not change in ⁇ , i. e., FV ( ⁇
  • const) ⁇ BV ( ⁇ ) ⁇ .
  • the approach shown herein to generate monitor specifications from hybrid system models 102 takes a verified formula (1) as input 100 and produces a monitor x m in quantifier-free first-order form as output.
  • the algorithm involves the following steps:
  • the specification conjecture for the water tank model is given below. It is constructed from the model by removing the loop, flipping the modality, and formulating the specification requirement as a property, since we are interested in a relation between two consecutive states and (recalled by x + , f + and t + ). Using theorem proving, we analyze the conjecture to reveal the actual monitor specification 104 .
  • the proof rules of are used to analyze the specification conjecture x m . These proof rules syntactically decompose a hybrid model 100 into easier-to-handle parts, which leads to sequents with first-order real arithmetic formulas towards the leaves of a proof. Using real arithmetic quantifier elimination we close sequents with logical tautologies, which do not need to be checked at runtime since they always evaluate to true for any input. The conjunction of the remaining open sequents is the monitor specification 104 , which implies (2).
  • quantifier elimination QE is used to reveal an equivalent quantifier-free formula, shown as reference number 108 in FIG. 3 .
  • the analysis of the specification conjecture finishes with collecting the open sequents from the proof to create the monitor specification x m ⁇ def (open sequent) 104 .
  • the collected open sequents may include new logical variables and new (Skolem) function symbols that were introduced for nondeterministic assignments and differential equations when handling existential or universal quantifiers.
  • the invertible quantifier rule i ⁇ is used to re-introduce existential quantifiers for the new logical variables.
  • the now quantified logical variables are discovered to be equal to one of the post-state variables later in the proof, because those variables did not change in the model after the assignment. If this is the case, proof rule ⁇ can be used to further simplify the monitor specification by substituting the corresponding logical variable x with its equal term ⁇ .
  • Controller monitors 112 are systematically derived in processes 106 and 110 from formulas 104 : ⁇
  • a controller monitor 112 can be used to initiate controller switching similar to Simplex.
  • Theorem 2 Controller monitor correctness.
  • ⁇ tilde over (v) ⁇ be a post-controller state. If (v, ⁇ tilde over (v) ⁇ ) x c with x c ⁇
  • ⁇ .
  • Clock drift, sensor uncertainty and actuator disturbance are incorporated into the water tank model to express expected deviation.
  • the measured level x is within a known sensor uncertainty u of the real level x (i.e. x ⁇ [x ⁇ u, x+u]).
  • Differential inequalities are used to model clock drift and actuator disturbance.
  • the clock which wakes the controller, is slower than the real time by at most a time drift of c; it can be arbitrarily fast.
  • the water flow disturbance is at most d, but the water tank is allowed to drain arbitrarily fast (even leaks when the pump is on).
  • Example6 can be analyzed in the same way as the previous examples, with the crucial exception of the differential inequalities.
  • the proof rule (′) cannot be used to analyze this model, because differential inequalities do not have polynomial solutions. Instead, the DR and DE proof rules of are used to turn differential inequalities into a differential-algebraic constraint form that lets us proceed with the proof.
  • Rule DR turns a differential-algebraic constraint into another differential-algebraic constraint , which implies , written ⁇ .
  • controller monitors non-compliance of a controller implementation with respect to the modeled controller can be detected right away.
  • model monitors non-compliance of the actual system dynamics with respect to the modeled dynamics can be detected when they first occur. In such cases, a fail-safe action is switched to, which is verified using standard techniques, in both non-compliance cases.
  • the crucial question is: can such a method always guarantee safety?
  • the answer is linked to the image computation problem in model checking (i. e., approximation of states reachable from a current state), which is known to be not semi-decidable by numerical evaluation at points; approximation with uniform error is only possible if a bound is known for the continuous derivatives.
  • a prediction monitor is derived to check whether a current control decision will be able to keep the system safe for time s even if the actual continuous dynamics deviate from the model.
  • a prediction monitor checks the current state, because all previous states are ensured by a model monitor and subsequent states are then safe by (1).
  • Theorem 3 (Prediction monitor correctness). Let ⁇ * be provably safe, i. e.,
  • ModelPlex beyond soundness is that monitor synthesis is computable, which yields a synthesis algorithm, and that the correctness of those synthesized monitors with respect to their specification is decidable. See Theorem 4.
  • Theorem 4 (Monitor correctness is decidable and monitor synthesis computable). Assume canonical models of the form ⁇ ctrl ; ⁇ plant without nested loops, with solvable differential equations in ⁇ plant and disturbed plants ⁇ ⁇ plant with constant additive disturbance ⁇ (see Definition. 2). Then, monitor correctness is decidable, i. e., the formulas X m ⁇ ⁇ Y V + , X c ⁇ ⁇ ctrl Y V + ⁇ V + , and X p ⁇ ⁇ ctrl (Y V + [ ⁇ ⁇ plant ] ⁇ ) are decidable. Also, monitor synthesis is computable, i.
  • a software prototype was developed and integrated into the modeling tool Sphinx to automate many of the described steps.
  • the prototype generates X m , X c , and X p conjectures from hybrid programs, collects open sequents, and interacts with KeYmaera.
  • the dimension of the monitor conjecture is listed in terms of the number of variables. The number of steps and open sequents are compared when deriving the monitor using manual proof steps to apply Option 1 and fully automated w/o Option 1, and the number of steps in the monitor correctness proof. Finally, the monitor size in terms of arithmetic, comparison, and logical operators in the monitor formula is listed.
  • ModelPlex bases on a reachability relation semantics instead of trace semantics, since it is easier to handle and suffices for checking at sample points.
  • the semantics of is a Kripke semantics in which states of the Kripke model are states of the hybrid system.
  • a state is a map v:V ⁇ ; the set of all states is denoted by Sta.
  • ⁇ if formula ⁇ is true at state v (Def. 4).
  • denotes the real value of term ⁇ at state .
  • the semantics of HP ⁇ is captured by the state transitions that are possible by running ⁇ .
  • transition relation ⁇ specifies which state is reachable from a state v by operations of ⁇ . It is defined as follows.
  • Lemma 1 (Loop prior and posterior state).
  • be a hybrid program and ⁇ * be the program that repeats ⁇ arbitrarily many times.
  • the model that ⁇ , i.e.,
  • the sequence of states originates from an ⁇ * execution from Y V 0 to Y V n , i.e.,
  • Y V ⁇ ⁇ ⁇ * Y V + .
  • Theorem 1 (Model monitor correctness). Let ⁇ * be provably safe, so
  • ⁇ /V m k
  • const denotes the conditions of ⁇ that involve only constants that do not change in ⁇ , i.e., FV ( ⁇
  • const ) ⁇ BV( ⁇ ) ⁇ .
  • V m v n+1
  • ⁇ /V m we get ⁇ n+1 and ( n , n+1 ) ⁇ ( ⁇ ). Hence ( 0 , n+1 ) ⁇ ( ⁇ *) because by induction hypothesis ( 0 , n ) ⁇ ( ⁇ *) and we conclude n+1 ⁇ by assumption ⁇ [ ⁇ ] ⁇ using 0 ⁇ .
  • Theorem 2 Controller monitor correctness. Let ⁇ of the canonical form ⁇ ctrl ; ⁇ plant . Assume ⁇ [ ⁇ *] ⁇ has been proven with invariant ⁇ as in (1). Let ⁇
  • const ⁇ ⁇ ctrl Y V c + then we have that (v, ) ⁇ ( ⁇ ctrl ) and ⁇ .
  • ModelPlex turns questions [ ⁇ *] ⁇ and a* ⁇ into [ ⁇ ] ⁇ and ⁇ ⁇ , respectively.
  • Monitor correctness is decidable.
  • Monitor correctness is decidable for canonical models of the form ⁇ ctrl ; ⁇ plant without nested loops, with solvable differential equations in ⁇ plant and disturbed plans ⁇ ⁇ plant with constant additive disturbance ⁇ i.e., X m ⁇ ⁇ Y V + ,X c ⁇ ⁇ ctrl Y V + , and X p ⁇ ⁇ Y V + [ ⁇ ⁇ plant ] ⁇ ) are decidable.
  • Model monitor X m ⁇ ⁇ Y V + followss from relative decidability of , because Cl ⁇ (X m ⁇ Y V + ) contains no free variables.
  • Controller monitor X c ⁇ ⁇ ctrl Y V + followss from relative decidability of , because Cl ⁇ (X c ⁇ ⁇ ctrl Y V + ) contains no free variables.
  • the disturbance functions f( ⁇ , ⁇ ) and g( ⁇ , ⁇ ) applied to the solution as an oracle we have the disturbance functions f( ⁇ , ⁇ ) and g( ⁇ , ⁇ ) applied to the solution as an oracle (By design, the disturbed plant ⁇ ⁇ plant also includes a clock x 0 , so the oracle additionally includes the trivial differential invariant x 0 ⁇ 0) for differential invariants (i. e., the differential invariant is a pipe around the solution without disturbance). Specifically, to show (X p Y V + ) ⁇ [ ⁇ ⁇ plant ] ⁇ by Def.
  • Theorem 6 (Monitor synthesis is computable). Synthesis of X m , X c , and X p monitors is computable for canonical models of the form ⁇ ctrl ; ⁇ plant without nested loops, with solvable differential equations in ⁇ plant and plants ⁇ ⁇ plant with constant additive disturbance ⁇ , i. e., synth m : ⁇ Y V + ⁇ X m , synth c : ⁇ ctrl Y V + ⁇ X c , and synth p : ⁇ (Y V + [ ⁇ plant ] ⁇ ) ⁇ X p are computable.
  • Model monitor synthesis X m the solution rule ′ would make progress, because the differential equations in ⁇ plant are solvable;
  • Prediction monitor synthesis X p the disturbance functions f( ⁇ , ⁇ ) and g( ⁇ , ⁇ ) applied to the solution provide differential invariants (see proof of Theorem 5) so that the differential cut rule, the differential invariant rule, and the differential weakening rule would make progress.
  • the quantifier elimination rule QE would be applicable and turn the formula including quantifiers into an equivalent quantifier-free formula.
  • the open sequent neither contains nondeterministic repetition, nor a differential equation, nor a quantifier.
  • the open sequent is a first-order quantifier-free formula.
  • Preconditions, postconditions and invariants are crucial conditions in CPS design. Monitors for these conditions can check (i) whether or not it is safe to start a particular controller (i. e., check that the precondition of a controller is satisfied), (ii) whether or not a controller complies with its specification (i. e., check that a controller delivers set values that satisfy its post condition), and (iii) whether or not the system is still within its safety bounds (i. e., check that the loop invariant of ⁇ * is satisfied).
  • Precondition and post condition monitors are useful to decide whether or not it is safe to invoke a controller in the current state, and whether or not to trust a controller output.
  • An invariant monitor of a CPS ⁇ * captures the main assumptions that have to be true throughout system execution. When an invariant monitor is unsatisfied, it may no longer be safe to run the CPS; a fail-safe controller can act as a mitigation strategy.
  • Design-by-contract monitors are useful to monitor specific design decisions, which are explicitly marked in the model. Our approach systematically creates monitors for a complete specification of the behavior of the model.
  • a design for a CPS with a fail-safe fallback controller involves proving two properties.
  • the fail-safe controller ctrl safe ensures the safety property ⁇ as in formula (4) below. This property is only provable if we discover an invariant G for the CPS with the fail-safe controller. Then we use G as the safety condition for generating a prediction monitor. ⁇ [(ctrl safe ;plant)*@inv(G)] ⁇
  • Algorithm 1 lists the ModelPlex specification conjecture analysis algorithm 106 , which turns a specification conjecture into an actual monitor, and is shown in flow-chart form in FIG. 4 .
  • ModelPlex monitor synthesis input A hybrid program ⁇ , a set of variables V ⁇ BV ( ⁇ ), an initial condition ⁇ such that
  • ⁇ ⁇ [ ⁇ *] ⁇ , output: A monitor X m such that
  • X m ⁇ ⁇
  • Monitor X m validates the complete model (as in the examples throughout this work) and is executed at the beginning of each control cycle (before the controller runs).
  • monitor X c resembles conventional runtime verification approaches, which do not check CPS behavior for compliance with the complete hybrid model. This way, we detect unexpected deviations from the model at the beginning of each control cycle, while we detect unsafe control actions immediately before they are taken. With only monitor X m in place we would require an additional control cycle to detect unsafe control action, whereas with only monitor X c in place we would miss deviations from the model. Note that we could run monitor X m in place of X c to achieve the same effect. But monitor X m implements a more complicated formula, which is unnecessary when only the controller output should be validated.
  • FIG. 2 shows a plot of the variable traces of one simulation run.

Abstract

A method for ensuring that verification results about models apply to cyber-physical systems (CPS) implementations is presented. The invention provides correctness guarantees for CPS executions at runtime. Offline verification of CPS models are combined with runtime validation of system executions for compliance with the model. The invention ensures that the verification results obtained for the model apply to the actual system runs by monitoring the behavior of the world for compliance with the model, assuming the system dynamics deviation is bounded. If, at some point, the observed behavior no longer complies with the model, such that offline verification results no longer apply, provably safe fallback actions are initiated. The invention includes a systematic technique to synthesize provably correct monitors automatically from CPS proofs in differential dynamic logic.

Description

RELATED APPLICATIONS
This application claims the benefit, under 35 U.S.C.
Figure US10872187-20201222-Ovalhollow
371, of PCT Application No. PCT/US14/60019, filed Oct. 10, 2014, which claims the benefit of U.S. Provisional Application No. 61/961,366, filed on Oct. 11, 2013, and U.S. Provisional Application No. 61/999,318, Filed Jul. 23, 2014. All of these applications are hereby incorporated by reference.
GOVERNMENT INTEREST
This invention was made with government support under DARPA Number FA87501220291. The government has certain rights in this invention.
FIELD OF THE INVENTION
This invention pertains to the field of cyber-physical systems (CPS), and, in particular to models approximating the behavior of CPS and methods for monitoring the actual CPS that are based on the models.
BACKGROUND OF THE INVENTION
Formal verification and validation play a crucial role in making cyber-physical systems (CPS) safe. Formal methods make strong guarantees about the system behavior if accurate models of the system can be obtained, including models of the controller and of the physical dynamics. In CPS, models are essential; but any model that can be built necessarily deviates from the real world. If the real system fits to the model, the behavior of the real system can be guaranteed to satisfy the correctness properties verified with respect to the model. If not, then this verification is impossible.
Cyber-physical systems (“CPS”) span controllers and the relevant dynamics of the environment. Since safety is crucial for CPS, their models (e. g., hybrid system models) need to be verified formally. Formal verification guarantees that a model is safe with respect to a safety property. The remaining task is to validate whether the models are adequate, such that the verification results transfer to the system implementation.
Actual system execution, however, provides many opportunities for surprising deviations from the model. Faults may cause the system to function improperly, sensors may deliver uncertain values and actuators may suffer from disturbance. The formal verification may have assumed simpler ideal-world dynamics for tractability reasons or made un-realistically strong assumptions about the behavior of other agents in the environment. Simpler models are often better for real-time decisions and optimizations, because they make predictions feasible to compute at the required rate. The same phenomenon of simplicity for predictability is often exploited for the models in formal verification and validation. As a consequence, the verification results obtained about models of a CPS only apply to the actual CPS at runtime to the extent that the system fits to the model.
Validation, i.e., checking whether a CPS implementation fits to a model, is an interesting but difficult problem. CPS models are more difficult to analyze than ordinary (discrete) programs because of the physical plant, the environment, sensor inaccuracies, and actuator disturbance. In CPS, models are essential; but any model necessarily deviates from the real world. Still, good models can be correct within certain error margins.
SUMMARY OF THE INVENTION
Herein we introduce a method (referred to herein as “ModelPlex”) to synthesize monitors by theorem proving. The method uses sound proof rules to formally verify that a model is safe and to synthesize provably correct monitors that validate compliance of system executions with the model.
This invention performs runtime model validation. That is, validating whether a model, shown for example, in FIG. 3 as reference number 100, which is assumed for verification purposes is adequate for a particular system execution to ensure that the verification results apply to the current execution. The invention checks system execution with respect to a monitor specification 104, and thus, belongs to the field of runtime verification. Herein, the term runtime validation is used to clearly convey the purpose of monitoring. While “runtime verification” monitors properties without offline verification, “runtime validation” monitors model adequacy to transfer offline verification results. The focus of the invention is on verifiably correct runtime validation to ensure that verified properties of models provably apply, which is important for safety and certification of CPS.
If an observed system execution fits to the verified model 12, then this execution is safe according to the offline verification result about the model. If it does not fit, then the system is potentially unsafe because it no longer has an applicable safety proof, so a verified fail-safe action to avoid safety risks is initiated. Checking whether a system execution fits to a verified model 12 includes checking that the actions chosen by the (unverified) controller implementation fit to one of the choices and requirements of the verified controller model. It also includes checking that the observed states can be explained by the plant model. The crucial questions are: How can a compliance monitor be synthesized that provably represents the verified model? How much safety margin does a system need to ensure that fail-safe actions are initiated early enough for the system to remain safe even if its behavior ceases to comply with the model?
The second question is related to feedback control and can only be answered when assuming constraints on the deviation of the real system dynamics from the plant model. Otherwise, if the real system can be infinitely far off from the model, safety guarantees are impossible. By the sampling theorem in signal processing, such constraints further enable compliance monitoring solely on the basis of sample points instead of the unobservable intermediate states about which no sensor data exists. When such constraints are not available, the method of the present invention still generates verifiably correct runtime tests, which detect deviation from the model at the sampling points, not just between them. A fail-safe action will then lead to best-effort mitigation of safety risks (rather than guaranteed safety).
As presented herein, the present invention is a method to synthesize verifiably correct runtime validation monitors automatically. ModelPlex uses theorem proving with sound proof rules to turn hybrid system models into monitors in a verifiably correct way. Upon non-compliance with the model, ModelPlex initiates provably safe fail-safe actions.
ModelPlex is a principle to build and verify high-assurance controllers for safety-critical computerized systems that interact physically with their environment. It guarantees that verification results about CPS models transfer to the real system by safeguarding against deviations from the verified model. Monitors created by ModelPlex are provably correct and check at runtime whether or not the actual behavior of a CPS complies with the verified model and its assumptions. Upon non-compliance, ModelPlex initiates fail-safe fallback strategies. To initiate the fallback strategies early enough, ModelPlex uses prediction on the basis of disturbed plant models to check safety for the next control cycle. This way, ModelPlex ensures that verification results about a model of a CPS transfer to the actual system behavior at runtime.
BRIEF DESCRIPTION OF THE DRAWINGS
FIG. 1 shows the use of ModelPlex monitors along a system execution.
FIG. 2 show the water tank simulation using monitors
FIG. 3 is a high level flow chart of the process of deriving monitors from a model.
FIG. 4 is a flow chart of the “Analyze Monitor Specification” step of the process shown in FIG. 3
DETAILED DESCRIPTION OF THE INVENTION Preliminaries: Differential Dynamic Logic
For hybrid systems verification differential dynamic logic
Figure US10872187-20201222-P00001
is used, which has a notation for hybrid systems as hybrid programs.
Figure US10872187-20201222-P00002
allows us to make statements that we want to be true for all runs of a hybrid program ([α]ø) or for at least one run
Figure US10872187-20201222-P00003
α
Figure US10872187-20201222-P00004
ø) of a hybrid program.
Both constructs are necessary to derive safe monitors: [α]ø proofs are needed to ensure that all behavior of a model (including controllers) is safe;
Figure US10872187-20201222-P00005
α
Figure US10872187-20201222-P00006
ø proofs are needed to find monitor specifications that detect whether or not system execution fits to the verified model.
Table 1 summarizes the relevant syntax fragment of hybrid programs together with an informal semantics. The semantics ρ(α) of hybrid program α is a relation on initial and final states of running α. The set of
Figure US10872187-20201222-P00007
formulas is generated by the following grammar (<∈{<, ≤, =, ≥, >}, and θ1, θ2 are arithmetic expressions in +, −, ·, / over the reals):
Φ::=θ1˜θ2|
Figure US10872187-20201222-P00008
Φ|Φ
Figure US10872187-20201222-P00009
ψ|Φ
Figure US10872187-20201222-P00010
ψ|Φ→ψ|∀xΦ|∃xΦ|[α]Φ|
Figure US10872187-20201222-P00011
α
Figure US10872187-20201222-P00012
Φ
Differential dynamic logic comes uses a theorem prover with a verification technique to prove correctness properties of hybrid programs. One example of a theorem prover and the one that is used in the preferred embodiment of the invention is KeYmaera.
TABLE 1
Hybrid program representations of hybrid systems.
Statement Effect
α; β sequential composition, first run hybrid program α, then
hybrid program β
α ∪ β nondeterministic choice, following either hybrid
program α or β
α* nondeterministic repetition, repeats hybrid program
α n ≥ 0 times
x := θ assign value of term θ to variable x (discrete jump)
x := * assign arbitrary real number to variable x
?F check that a particular condition F holds, and abort if it
does not
(x1′ = θ1, . . . , evolve xi along differential equation system xi′ = θi
xn′ = θn & F) restricted to maximum evolution domain F
ModelPlex Approach for Verified Runtime Validation
CPS are almost impossible to get right without sufficient attention to prior analysis, for instance by formal verification and formal validation techniques. We assume to be given a verified model of a CPS, i.e. formula (1) is proved valid. Note that differential dynamic logic (
Figure US10872187-20201222-P00013
) and KeYmaera as a theorem prover are used to illustrate the concepts herein. The concept of ModelPlex is not predicated on the use of KeYmaera to prove (1). Other verification techniques could be used to establish validity of this formula. The flexibility of the underlying logic
Figure US10872187-20201222-P00014
, its support for both [α]Φ and
Figure US10872187-20201222-P00015
α
Figure US10872187-20201222-P00016
Φ, and its proof calculus, however, are exploited for systematically constructing monitors from proofs in the sequel.
Φ→[α*]ψ with invariant φ→[α]φs.t.Φ→φ and φ→ψ  (1)
Formula (1) expresses that all runs of the hybrid system α*, which start in states that satisfy the precondition ø and repeat the model α arbitrarily many times, must end in states that satisfy the post condition ψ. Formula (1) is proved using some form of induction, which shows that a loop invariant φ holds after every run of α if it was true before. The model α is a hybrid system model 100 of a CPS, which means that it describes both the discrete control actions of the controllers in the system and the continuous physics of the plant and the system's environment.
The safety guarantees obtained by proving formula (1) about the model α* transfer to the real system, if the actual CPS execution fits to α*. Because safety properties should be preserved, a CPS γ fits to a model α*, if the CPS reaches at most those states that are reachable by the model, i.e., ρ(γ)ρ(α*). However, we do not know γ and therefore need to find a condition based on α* that can be checked at runtime to see if concrete runs of γ behave like α*.
Checking the post condition ψ is not sufficient because, if ψ does not hold, the system is already unsafe. Checking the invariant φ is insufficient as well, because if φ does not hold, the controller can no longer guarantee safety, even though the system may not yet be unsafe. But if we detect when a CPS is about to deviate from α* before leaving φ, we can still switch to a fail-safe controller to avoid
Figure US10872187-20201222-P00017
ψ from happening.
As shown in FIG. 1, ModelPlex derives three kinds of monitors, a model monitor 20, a controller monitor 22, and a prediction monitor 24. Reachability between consecutive states in α, αctrl, and αδplant are checked by verifying states during execution against the corresponding monitor.
Model monitor 20—In each state vi the sample point vi−1 from the previous execution γi−1 is tested for deviation from the single α, not α* i. e., test (vi−1, vi) ∈ρ(α). If violated, other verified properties may no longer hold for the system. The system, however, is still safe if a prediction monitor 24 was satisfied on vi−1.Frequent violations indicate an inadequate model that should be revised to better reflect reality.
Controller monitor 22—In intermediate state {tilde over (v)}i the current controller decisions of the implementation γctrl are tested for compliance with the model, i.e., test (vi, {tilde over (v)}i) ∈ρ(αctrl). Controller monitors 22 are designed for switching between controllers similar to Simplex. If violated, the commands from a fail-safe controller replace the current controller's decisions to ensure that no unsafe commands are ever actuated.
Prediction monitor 24—In intermediate state {tilde over (v)}i the worst-case safety impact of the current controller decisions are tested with respect to the predictions of a bounded deviation plant model αδplant, which has a tolerance around the model plant αplant, i.e., check vi+1|=φ for all vi+1 such that ({tilde over (v)}i, vi+1) ∈ρ(αδplant). Note, that all vi+1 are simultaneously checked by checking {tilde over (v)}i for a characterizing condition of αδplant. If violated, the current control choice is not guaranteed to keep the system safe until the next control cycle and, thus, a fail-safe controller takes over.
The assumption for the prediction monitor 24 is that the real execution is not arbitrarily far off the plant models used for safety verification, because otherwise guarantees can neither be made on unobservable intermediate states nor on safety of the future system evolution. A separation of disturbance causes in the models can be used: ideal plant models αplant for correctness verification purposes, implementation deviation plant models αδplant for monitoring purposes. Any deviation model (e.g., piecewise constant disturbance, differential inclusion models of disturbance) is supported, as long as the deviation is bounded and differential invariants can be found. It is assumed that monitor evaluations are at most some ε time units apart (e.g., along with a recurring controller execution). Note that disturbance in αδplant is more manageable compared to α*, as single runs α can be focused on instead of repetitions for monitoring.
Relation Between States
A check that inspects states of the actual CPS to detect deviation from the model α* is systematically derived. First, a notion of state recall is established and shows that, when all previous state pairs comply with the model, compliance of the entire execution can be checked by checking the latest two states (vi−1, vi).
Definition 1 (State recall). V is used to denote the set of variables whose state we want to recall. YV
Figure US10872187-20201222-P00018
x∈V x=x− are used to express a characterization of the values of variables in a state prior to a run of α, where the fresh variables x to are always presumed to occur solely in YV . The variables in x can be used to recall this state. Likewise, YV +
Figure US10872187-20201222-P00019
x∈V x=x+ is used to characterize the posterior states and expect fresh x+.
With this notation, the following lemma states that an interconnected sequence of α transitions forms a transition of α*.
Lemma 1 (Loop prior and posterior state). Let α be a hybrid program and α* be the program that repeats arbitrarily many times. Assume that all consecutive pairs of states (vi−1, vi) ∈ρ(α) of n ∈
Figure US10872187-20201222-P00020
+ executions, whose valuations are recalled with YV i
Figure US10872187-20201222-P00021
x∈Vx=xi and YV i−1 are plausible with respect to the model α, i.e., . |=
Figure US10872187-20201222-P00022
1≤i≤n (YV i−1
Figure US10872187-20201222-P00023
α
Figure US10872187-20201222-P00024
YV i) with YV =YV 0 and YV +=YV n. Then, the sequence of states originates from an α* execution from YV 0 to YV n, i.e., |=YV 31→
Figure US10872187-20201222-P00025
α*
Figure US10872187-20201222-P00026
Y V +.
Lemma 1 enables us to check compliance with the model α* up to the current state by checking reachability of a posterior state from a prior state on each execution of α (i.e., online monitoring, which is easier because the loop was eliminated). To find compliance checks systematically, we construct formula (2), which relates a prior state of a CPS to its posterior state through at least one path through the model α. Consecutive states for α* mean before and after executions of α (i.e., α;↓α;↓α, not within α).
YV →(α)YV +  (2)
Formula (2) is satisfied in a state v, if there is at least one run of the model α starting in the state v recalled by YV and which results in a state ω recalled using YV +. In other words, at least one path through α explains how the prior state v got transformed into the posterior state ω. The
Figure US10872187-20201222-P00001
formula (2) characterizes the state transition relation of the model α directly. Its violation witnesses compliance violation. Compliance at all intermediate states cannot be observed by real-world sensors. (See Section ‘Monitoring Compliance Guarantees for Unobservable Intermediate States’ herein).
In principle, formula (2) would be a monitor, because it relates a prior state to a posterior state through the model of a CPS, but the formula is difficult, if not impossible, to evaluate at runtime, because it refers to a hybrid system α, which includes non-determinism and differential equations. The basic observation is that any formula that is equivalent to (2) but conceptually easier to evaluate in a state would be a correct monitor 112. We use theorem proving for simplifying formula (2) into quantifier-free first-order real arithmetic form so that it can be evaluated efficiently at runtime. The resulting first-order real arithmetic formula can be easily implemented in a runtime monitor and executed along with the actual controller. A monitor 112 is executable code that only returns true if the transition from the prior system state to the posterior state is compliant with the model 100. Thus, deviations from the model 100 can be detected at runtime, so that appropriate fallback and mitigation strategies can be initiated.
Remark 1. The complexity for evaluating an arithmetic formula over the reals for concrete numbers is linear in the formula size, as opposed to deciding the validity of such formulas, which is doubly exponential. Evaluating the same formula on floating point numbers is inexpensive, but may yield wrong results due to rounding errors; on exact rationals, the bit-complexity can be non-negligible. Interval arithmetic is used to obtain reliable results efficiently.
Example 1
A simple water tank is used as a running example to illustrate the concepts throughout this section. The water tank has a current level x and a maximum level m. The water tank controller, which runs at least every ε time units, non-deterministically chooses any flow f between a maximum outflow −1 and a maximum
m - x ɛ .
This water tank never overflows, as witnessed by a proof for the following
Figure US10872187-20201222-P00001
formula.
0 x m ɛ > 0 ϕ [ ( f := * ; ? ( - 1 f m - x ɛ ) ; t := 0 ; ( x = f , t = 1 & x 0 t ɛ ) ) * ] ( 0 x m ) ϕ
ModelPlex Monitor Synthesis
This section introduces the nature of ModelPlex monitor specifications, the approach in this invention for generating such specifications from hybrid system models, and how to turn those specifications into monitor code that can be executed at runtime along with the controller.
A ModelPlex specification 104 corresponds to the
Figure US10872187-20201222-P00027
formula (2). If the current state of a system does not satisfy a ModelPlex specification 104, some behavior that is not reflected in the model 100 occurred (e.g., the wrong control action was taken, unanticipated dynamics in the environment occurred, sensor uncertainty led to unexpected values, or the system was applied outside the specified operating environment).
A model monitor Xm checks that two consecutive states
Figure US10872187-20201222-P00028
and
Figure US10872187-20201222-P00029
can be explained by an execution of the model α, i.e., (
Figure US10872187-20201222-P00030
,
Figure US10872187-20201222-P00031
) ∈ρ(α). In the sequel, BV(α) are bound variables in α, FV (φ) are free variables in φ, Σ is the set of all variables, and A\B denotes the set of variables being in some set A but not in some other set B. Furthermore, we use v|A to denote v projected onto the variables in A.
Theorem 1 (Model monitor correctness). Let α* be provably safe, so
Figure US10872187-20201222-P00032
Φ→[α*]ψ. Let Vm=BV (α) ∪ FV (ψ). Let v0, v1, v2, v3 . . . ∈
Figure US10872187-20201222-P00033
n be a sequence of states, with v0
Figure US10872187-20201222-P00032
Φ and that agree on Σ\Vm, i.e., v0|Σ\v m =vk|Σ\V m for all k. We define (v, vi+1)
Figure US10872187-20201222-P00032
xm as xm evaluated in the state resulting from v by interpreting x+ as vi+1(x) for all x ∈Vm, i.e., vx + v i+1(x)
Figure US10872187-20201222-P00032
xm. If vi, vi+1)
Figure US10872187-20201222-P00032
xm for all i<n then we have vn
Figure US10872187-20201222-P00032
ψ where
X m≡(Φ|const
Figure US10872187-20201222-P00034
α
Figure US10872187-20201222-P00035
Y v m +)  (3)
and Φ|const denotes the conditions of Φ that involve only constants that do not change in α, i. e., FV (φ|const) ∩ BV (α)=ø.
The approach shown herein to generate monitor specifications from hybrid system models 102 takes a verified
Figure US10872187-20201222-P00036
formula (1) as input 100 and produces a monitor xm in quantifier-free first-order form as output. The algorithm involves the following steps:
    • 1. A
      Figure US10872187-20201222-P00037
      formula (1) about a model α of the form Φ→[α*]ψ is turned into a specification conjecture (3) of the form Φ|const
      Figure US10872187-20201222-P00038
      α
      Figure US10872187-20201222-P00039
      Yv m +. See process 102, resulting in monitor specification 104 in FIG. 3.
    • 2.Theorem proving on the specification conjecture (3) is applied until no further proof rules are applicable and only first-order real arithmetic formulas remain open. See process 106, resulting in monitor conditions 108, containing only first-order logic (FOL) in FIG. 3. Process 106 is also shown in more detail in FIG. 4, and an algorithmic representation of process 106 is shown in Section D herein.
    • 3. The monitor specification xm is the conjunction of the unprovable first-order real arithmetic formulas from open sub-goals.
Generate the monitor conjecture.
Figure US10872187-20201222-P00040
formula (1) is mapped syntactically to a specification conjecture of the form (3). By design, this conjecture will not be provable. But the unprovable branches of a proof attempt will reveal information that, had it been in the premises, would make (3) provable. Through Yv m +, those unprovable conditions collect the relations of the posterior state of model α characterized by x+ to the prior state x, i.e., the conditions are a representation of (2) in quantifier-free first-order real arithmetic.
Example 2
The specification conjecture for the water tank model is given below. It is constructed from the model by removing the loop, flipping the modality, and formulating the specification requirement as a property, since we are interested in a relation between two consecutive states
Figure US10872187-20201222-P00031
and
Figure US10872187-20201222-P00031
(recalled by x+, f+ and t+). Using theorem proving, we analyze the conjecture to reveal the actual monitor specification 104.
ɛ > 0 ϕ lowest f := * ; ? ( - 1 f m - x ɛ ) ; t := 0 ; ( x = f , t = 1 & x 0 t ɛ ) ( x = x * f = f * t = t * ) Υ V m +
Use theorem proving to analyze the specification conjecture. The proof rules of
Figure US10872187-20201222-P00001
are used to analyze the specification conjecture xm. These proof rules syntactically decompose a hybrid model 100 into easier-to-handle parts, which leads to sequents with first-order real arithmetic formulas towards the leaves of a proof. Using real arithmetic quantifier elimination we close sequents with logical tautologies, which do not need to be checked at runtime since they always evaluate to true for any input. The conjunction of the remaining open sequents is the monitor specification 104, which implies (2).
A complete sequence of proof rules applied to the monitor conjecture of the water tank is described in below in Section B. Most steps are simple when analyzing specification conjectures: sequential composition (
Figure US10872187-20201222-P00041
;
Figure US10872187-20201222-P00042
), nondeterministic choice (
Figure US10872187-20201222-P00043
Figure US10872187-20201222-P00044
), deterministic assignment (
Figure US10872187-20201222-P00045
:=
Figure US10872187-20201222-P00046
) and logical connectives (
Figure US10872187-20201222-P00047
r etc.) replace current facts with simpler ones or branch the proof. Challenges arise from handling nondeterministic assignment and differential equations in hybrid programs.
First, consider nondeterministic assignment x :=*. The proof rule for non-deterministic assignment (
Figure US10872187-20201222-P00048
*
Figure US10872187-20201222-P00049
) results in a new existentially quantified variable. By sequent proof rule ∃r, this existentially quantified variable is instantiated with an arbitrary term θ, which is often a new logical variable that is implicitly existentially quantified. Weakening (Wr) removes facts that are no longer necessary.
( * ) X x := X ϕ 1 x := * ϕ ( r ) Γ ϕ ( θ ) , x ϕ ( x ) , Δ 2 Γ x ϕ ( x ) , Δ ( Wr ) Γ Δ Γ ϕ , Δ
1 X is a new logical variable
2 θ is an arbitrary term, often a new (existential) logical variable X.
Optimization 1 (Instantiation Trigger). If the variable is not changed in the remaining α, xi=xi + is YV m + and X is not bound in YV m +, then instantiate the existential quantifier by rule ∃r with the corresponding xi + that is part of the specification conjecture (i.e., θ=xi +), since subsequent proof steps are going to reveal θ=xi + anyway.
Otherwise, a new logical variable is introduced which may result in an existential quantifier in the monitor specification if no further constraints can be found later in the proof.
Example 3
The corresponding steps in the water tank proof use
Figure US10872187-20201222-P00050
*
Figure US10872187-20201222-P00051
for the nondeterministic flow assignment (f:=*) and ∃r to instantiate the resulting existential quantifier ∃F with a new logical variable F (plant is an abbreviation for x′=f, t′=1&0≤x
Figure US10872187-20201222-P00052
t≤ε). The proof without and with application of Opt. 1 is given as.
Figure US10872187-20201222-C00001
Next, differential equations are handled. Even when the differential equation can be solved, existentially and universally quantified variables remain. Inspect the corresponding proof rule from the
Figure US10872187-20201222-P00001
calculus. For differential equations it must be proven that there exists a duration t, such that the differential equation stays within the evolution domain H throughout all intermediate times {tilde over (t)} and the result satisfies φ at the end. At this point there are three options:
    • i. Option 1: instantiate the existential quantifier, if it is known that the duration will be t+;
    • ii. Option 2: introduce a new logical variable, which is the generic case that always yields correct results, but may discover monitor specifications that are harder to evaluate;
( ) T 0 ( ( 0 t _ T x := y ( t _ ) H ) x := y ( T ) ϕ ) 1 x = θ & H ϕ ( QE ) QE ( ϕ ) 2 ϕ
1 T and {tilde over (t)} are fresh logical variables and
Figure US10872187-20201222-P00053
x :=y(T)
Figure US10872187-20201222-P00054
is the discrete assignment belonging to the solution y of the differential equation with constant symbol x as symbolic initial value
2 iff Φ≡QE (Φ), Φ is a first-order real arithmetic formula, QE(Φ) is an equivalent quantifier-free formula computable by [7]
    • iii. Option 3: use quantifier elimination (QE) to obtain an equivalent quantifier-free result (a possible optimization could inspect the size of the resulting formula).
Example 4
In the analysis of the water tank example, the differential equation are solved (see
Figure US10872187-20201222-P00055
Figure US10872187-20201222-P00056
and the substitutions f :=F and t :=0 are applied. In the next step (see ∃r,Wr), the existential quantifier ∃T is instantiated with t+ (i.e., T=t+ using Option 1 with the last conjunct) and uses weakening right (Wr) to systematically get rid of the existential quantifier that would otherwise still be left around by rule ∃r. Finally, quantifier elimination (QE) is used to reveal an equivalent quantifier-free formula, shown as reference number 108 in FIG. 3.
Figure US10872187-20201222-C00002
The analysis of the specification conjecture finishes with collecting the open sequents from the proof to create the monitor specification xm def
Figure US10872187-20201222-P00057
(open sequent) 104. The collected open sequents may include new logical variables and new (Skolem) function symbols that were introduced for nondeterministic assignments and differential equations when handling existential or universal quantifiers. The invertible quantifier rule i∃ is used to re-introduce existential quantifiers for the new logical variables. Often, the now quantified logical variables are discovered to be equal to one of the post-state variables later in the proof, because those variables did not change in the model after the assignment. If this is the case, proof rule ∃σ can be used to further simplify the monitor specification by substituting the corresponding logical variable x with its equal term θ.
( i ) Γ X ( Λ i ( Φ i ψ i ) ) , Δ 1 Γ , Φ 1 ψ 2 , Δ Γ , Φ 1 ψ 2 , Δ ( o ) ϕ ( θ ) 2 x ( x = θ ϕ ( x ) )
1 Among all open branches, free logical variable X only occurs in the branches Γ, Φ, ∛, ψ, Δ
2 Logical variable x does not appear in term θ
Example 5
The two open sequents of Examples 3 and 4 use a new logical variable F for the nondeterministic flow assignment f :=*. After further steps in the proof, the assumptions reveal additional information F=f+. Thus, the existential quantifier is re-introduced over all the open branches (i∃) and substitute f+ for F (∃σ). The sole open sequent of this proof attempt is the monitor specification xm of the water tank model.
Figure US10872187-20201222-C00003
Controller Monitor Synthesis
A controller monitor xc, shown as reference number 112 in FIG. 3, checks that two consecutive states v and w are reachable with one controller execution αctrl, i. e., (
Figure US10872187-20201222-P00030
,
Figure US10872187-20201222-P00031
) ∈ ρ(αctrl) with Vc, =BV (αctrl) ∪ FV (ψ). Controller monitors 112 are systematically derived in processes 106 and 110 from formulas 104: φ|const
Figure US10872187-20201222-P00058
αctrl
Figure US10872187-20201222-P00059
YV c +. A controller monitor 112 can be used to initiate controller switching similar to Simplex.
Theorem 2 (Controller monitor correctness). Let α of the canonical form αctrl; αplant Assume |=Φ→[α*]φ has been proven with invariant φ as in (1). Let v
Figure US10872187-20201222-P00060
Φ|const
Figure US10872187-20201222-P00057
Φ, as checked by xm(Theorem 1). Furthermore, let {tilde over (v)} be a post-controller state. If (v, {tilde over (v)})
Figure US10872187-20201222-P00061
xc with xc≡Φ|const
Figure US10872187-20201222-P00062
αctrl
Figure US10872187-20201222-P00063
YV c + then we have that (v, {tilde over (v)}) ∈ρ(αctrl) and {tilde over (v)}|=φ.
Monitoring in the Presence of Expected Uncertainty and Disturbance
Up to now exact ideal-world models have been considered. However, real-world clocks drift, sensors measure with some uncertainty, and actuators are subject to disturbance. This makes the exact models safe but too conservative, which means that monitors for exact models are likely to fall back to a fail-safe controller unnecessarily often. This section is a discussion of how ModelPlex specifications are found such that the safety property (1) and the monitor specification become more robust to expected uncertainty and disturbance. That way, only unexpected deviations beyond those captured in the normal operational uncertainty and disturbance of α* cause the monitor to initiate fail-safe actions.
In
Figure US10872187-20201222-P00001
we can, for example, use nondeterministic assignment from an interval to model sensor uncertainty and piecewise constant actuator disturbance, or differential inequalities for actuator disturbance. Such models include non-determinism about sensed values in the controller model and often need more complex physics models than differential equations with polynomial solutions.
Example 6
Clock drift, sensor uncertainty and actuator disturbance are incorporated into the water tank model to express expected deviation. The measured level x, is within a known sensor uncertainty u of the real level x (i.e. x ∈[x−u, x+u]). Differential inequalities are used to model clock drift and actuator disturbance. The clock, which wakes the controller, is slower than the real time by at most a time drift of c; it can be arbitrarily fast. The water flow disturbance is at most d, but the water tank is allowed to drain arbitrarily fast (even leaks when the pump is on). To illustrate different modeling possibilities, we use additive clock drift and multiplicative actuator disturbance.
0 x m ɛ > 0 c < 1 0 u 0 < d [ ( x s := * ; ? ( x - u x s x + u ) ; f := * ; ? ( - 1 f m - x s - u ɛ ( 1 - c ) ) ; t := 0 ; { x fd , 1 - c t x 0 t ɛ } ) * ] ( 0 x m )
Example6 can be analyzed in the same way as the previous examples, with the crucial exception of the differential inequalities. The proof rule (′) cannot be used to analyze this model, because differential inequalities do not have polynomial solutions. Instead, the DR and DE proof rules of
Figure US10872187-20201222-P00064
are used to turn differential inequalities into a differential-algebraic constraint form that lets us proceed with the proof. Rule DE turns a differential inequality x′≤θ into a quantified differential equation ∃{tilde over (d)}(x′={tilde over (d)} & {tilde over (d)}≤θ) with an equivalent differential-algebraic constraint. Rule DR turns a differential-algebraic constraint
Figure US10872187-20201222-P00065
into another differential-algebraic constraint
Figure US10872187-20201222-P00066
, which implies
Figure US10872187-20201222-P00065
, written
Figure US10872187-20201222-P00067
Figure US10872187-20201222-P00068
.
( DR ) 𝒟 δ ( 𝒟 ) ϕ 1 ( δ ) ϕ ( DE ) X ( d _ ( X = d _ d _ θ H ) X θ H ) ( d _ ( x = d _ & d _ θ H ) ) ϕ 2 ( x θ & H ) ϕ
1 differential refinement: differential-algebraic constraints
Figure US10872187-20201222-P00069
,
Figure US10872187-20201222-P00070
have the same changed variables
2 differential inequality elimination: special case of DR, which rephrases the differential inequalities≤as differential-algebraic constraints (accordingly for other or mixed inequalities systems).
Currently, for finding model monitors, our prototype tool solves differential equations by the proof rule (‘). Thus, it finds model monitor specifications for differential algebraic equations with polynomial solutions and for differential algebraic inequalities, which can be refined into solvable differential algebraic equations as in Example 6. For prediction monitors (discussed in Section below)
Figure US10872187-20201222-P00071
techniques are used for finding differential variants and invariants, differential cuts, and differential auxiliaries to handle differential equations and inequalities without polynomial solutions.
Monitoring Compliance Guarantees for Unobservable Intermediate States
With controller monitors, non-compliance of a controller implementation with respect to the modeled controller can be detected right away. With model monitors, non-compliance of the actual system dynamics with respect to the modeled dynamics can be detected when they first occur. In such cases, a fail-safe action is switched to, which is verified using standard techniques, in both non-compliance cases. The crucial question is: can such a method always guarantee safety? The answer is linked to the image computation problem in model checking (i. e., approximation of states reachable from a current state), which is known to be not semi-decidable by numerical evaluation at points; approximation with uniform error is only possible if a bound is known for the continuous derivatives. This implies that additional assumptions are needed about the deviation between the actual and the modeled continuous dynamics to guarantee compliance for unobservable intermediate states. Unbounded deviation from the model between sample points just is unsafe, no matter how hard a controller tries. Hence, worst-case bounds capture how well reality is reflected in the model.
A prediction monitor is derived to check whether a current control decision will be able to keep the system safe for time s even if the actual continuous dynamics deviate from the model. A prediction monitor checks the current state, because all previous states are ensured by a model monitor and subsequent states are then safe by (1).
Definition 2 (ε-bounded plant with disturbance δ). Let αplant be a model of the form x′=θ& H. An ε-bounded plant with disturbance δ, written αδplant, is a plant model of the form xo :=0; (f(θ, δ)≤x′≤g(θ, δ) & H
Figure US10872187-20201222-P00072
xo≤ε) for some f, g with fresh variable ε>0 and assuming xo′=1. That disturbance δ is constant if x ∈ δ; it is additive if f(θ, δ)=θ−δ and g(θ, δ) =θ+δ.
Theorem 3 (Prediction monitor correctness). Let α* be provably safe, i. e., |=Φ→[α*]ψ has been proved using invariant φ as in (1). Let Vp=BV (α) ∪ FV ([α]φ]). Let v|=Φ|const
Figure US10872187-20201222-P00073
φ, as checked by Xm from Theorem 1. Further assume {tilde over (v)} such that (v, {tilde over (v)}) ∈ρ(αctrl), as checked by Xc from Theorem 2. If (v, {tilde over (v)})
Figure US10872187-20201222-P00061
Xp with Xp≡(Φ|const
Figure US10872187-20201222-P00074
φ)→
Figure US10872187-20201222-P00075
αctrl
Figure US10872187-20201222-P00076
(YV P +
Figure US10872187-20201222-P00077
δplant]φ), then we have for all ({tilde over (v)}, ω) ∈ρ(αδplant) that ω|=φ.
Remark 2. By adding a controller execution
Figure US10872187-20201222-P00078
αctrl
Figure US10872187-20201222-P00079
prior to the disturbed plant model, we synthesize prediction monitors that take the actual controller decisions into account. For safety purposes, a monitor definition without controller Xp≡(Φ|const
Figure US10872187-20201222-P00080
φ)→[αδplant]φ could be used, but doing so results in a conservative monitor, which has to keep the CPS safe without knowledge of the actual controller decision.
Decidability and Computability
One useful characteristic of ModelPlex beyond soundness is that monitor synthesis is computable, which yields a synthesis algorithm, and that the correctness of those synthesized monitors with respect to their specification is decidable. See Theorem 4.
Theorem 4 (Monitor correctness is decidable and monitor synthesis computable). Assume canonical models of the form α≡□αctrl; αplant without nested loops, with solvable differential equations in αplant and disturbed plants αδplant with constant additive disturbance δ (see Definition. 2). Then, monitor correctness is decidable, i. e., the formulas Xm
Figure US10872187-20201222-P00081
α
Figure US10872187-20201222-P00082
YV +, Xc
Figure US10872187-20201222-P00081
αctrl
Figure US10872187-20201222-P00082
YV + γV +, and Xp
Figure US10872187-20201222-P00081
αctrl
Figure US10872187-20201222-P00082
(YV +
Figure US10872187-20201222-P00083
δplant]φ) are decidable. Also, monitor synthesis is computable, i. e., the functions synthm:
Figure US10872187-20201222-P00084
α
Figure US10872187-20201222-P00082
YV +→Xm, synthc:
Figure US10872187-20201222-P00081
αctrl
Figure US10872187-20201222-P00082
YV +→Xc and synthp:
Figure US10872187-20201222-P00081
αctrl
Figure US10872187-20201222-P00082
(YV +
Figure US10872187-20201222-P00085
δplant]φ)→Xp are computable.
Evaluation
A software prototype was developed and integrated into the modeling tool Sphinx to automate many of the described steps. The prototype generates Xm, Xc, and Xp conjectures from hybrid programs, collects open sequents, and interacts with KeYmaera.
To evaluate the method, we created monitors for prior case studies of non-deterministic hybrid models of autonomous cars, train control systems, and robots, for example, adaptive cruise control, intelligent speed adaptation, the European train control system, and ground robot collision avoidance. Table 2 summarizes the evaluation. For the model, the dimension in terms of the number of function symbols and state variables is listed, as is the size of the safety proof (i. e., number of proof steps and branches).
TABLE 2
Monitor complexity case studies
Model Monitor
proof size steps (open seq.) proof steps
Case Study dim. (branches) dim. w/Opt. 1 auto (branches) size
Xm Water tank 5 38 (4)  3  16 (2) 20 (2) 64 (5) 32
Cruise control [18] 11 969 (124) 7  127 (13) 597 (21) 19514 (1058) 1111
Speed limit [23] 9 410 (30)  6  487 (32) 5016 (126) 64311 (2294) 19850
Xc Water tank 5 38 (4)  1  12 (2) 14 (2) 40 (3) 20
Cruise control [18] 11 969 (124) 7   83 (13)  518 (106) 5840 (676) 84
Robot [22] 14 3350 (225)  11   94 (10) 1210 (196) 26166 (2854) 121
ETCS safety [35] 10 193 (10)  13  162 (13) 359 (37) 16770 (869)  153
Xp Water tank 8 80 (6)  1 135 (4) N/A 307 (12) 43
http://www.cs.cmu.edu/-smitsch/resource/modelplex_study.zip
For the monitor, the dimension of the monitor conjecture is listed in terms of the number of variables. The number of steps and open sequents are compared when deriving the monitor using manual proof steps to apply Option 1 and fully automated w/o Option 1, and the number of steps in the monitor correctness proof. Finally, the monitor size in terms of arithmetic, comparison, and logical operators in the monitor formula is listed.
Although the number of steps and open sequents differ significantly between manual interaction for Option 1 and fully automated synthesis, the synthesized monitors are logically equivalent. But applying Option 1 usually results in structurally simpler monitors, because the conjunction over a smaller number of open sequents (See Table 2) can still be simplified automatically. The model monitors for cruise control and speed limit control are significantly larger than the other monitors, because their size already prevents automated simplification by Mathematica. As future work, KeYmaera will be adapted to allow user-defined tactics to apply Option 1 automatically.
A. Proofs A.1 Formal Semantics of
ModelPlex bases on a reachability relation semantics instead of trace semantics, since it is easier to handle and suffices for checking at sample points.
The semantics of
Figure US10872187-20201222-P00087
, as defined in [27], is a Kripke semantics in which states of the Kripke model are states of the hybrid system. Let
Figure US10872187-20201222-P00088
denote the set of real numbers. A state is a map v:V→
Figure US10872187-20201222-P00089
; the set of all states is denoted by Sta. We write
Figure US10872187-20201222-P00030
|=Φ if formula Φ is true at state v (Def. 4). Likewise,
Figure US10872187-20201222-P00090
θ
Figure US10872187-20201222-P00091
, denotes the real value of term θ at state
Figure US10872187-20201222-P00030
. The semantics of HP α is captured by the state transitions that are possible by running α. For continuous evolutions, the transition relation holds for pairs of states that can be interconnected by a continuous flow respecting the differential equation and invariant region. That is, there is a continuous transition along xI=θ & H from state
Figure US10872187-20201222-P00030
to state
Figure US10872187-20201222-P00031
, if there is a solution of the differential equation xI=θ that starts in state
Figure US10872187-20201222-P00030
and ends in
Figure US10872187-20201222-P00031
and that always remains within the region H during its evolution.
Definition 3 (Transition semantics of hybrid programs). The transition relation ρ specifies which state
Figure US10872187-20201222-P00031
is reachable from a state v by operations of α. It is defined as follows.
    • 1. (ν,ω)∈ρ(x:=θ) iff
      Figure US10872187-20201222-P00090
      z
      Figure US10872187-20201222-P00091
      ν=
      Figure US10872187-20201222-P00090
      z
      Figure US10872187-20201222-P00091
      ωf·a·z≠x and
      Figure US10872187-20201222-P00090
      x
      Figure US10872187-20201222-P00091
      ω=
      Figure US10872187-20201222-P00090
      θ
      Figure US10872187-20201222-P00091
      ν.
    • 2. (ν,ω)∈ρ(x:=*) iff
      Figure US10872187-20201222-P00090
      z
      Figure US10872187-20201222-P00091
      ν=
      Figure US10872187-20201222-P00090
      z
      Figure US10872187-20201222-P00091
      ωf·a·z≠x.
    • 3. (ν,ω)∈ρ(?φ) iff ν=ω and ν
      Figure US10872187-20201222-P00061
      φ.
    • 4. (ν,ω)∈ρ(x′11, . . . ,x′nn&H) iff for some r≤0, there is a (flow) function φ:[0,r]→Sta with φ(0)=ν,φ(r)=ω, such that for each time ζ∈[0, r]:
      • (i) The differential equation holds, i.e.,
d [ x ] w dt ( ζ ) = || θ i || ψ ( ζ )
for each xi,. (ii) For other variables y∉{x1, . . . ,xn, } the value remains constant, i.e.,
Figure US10872187-20201222-P00090
y
Figure US10872187-20201222-P00091
φ(ζ)=
Figure US10872187-20201222-P00090
y
Figure US10872187-20201222-P00091
φ(0).
      • (iii) The invariant is always respected, i.e., φ(ζ)
        Figure US10872187-20201222-P00061
        H.
    • 5. ρ(α∪β)=ρ(α)∪ρ(β)
    • 6. ρ(α;β)={(ν,ω):(ν,z)∈ρ(α),(z,ω)∈ρ(β) for a state z}
    • 7. ρ(α*)=∪n∈Nρ(αn) where αi+1{circumflex over (=)}(α;αi)and α0 {circumflex over (=)}?true.
Definition 4 (Interpretation of
Figure US10872187-20201222-P00001
formulas). The interpretation |= of a
Figure US10872187-20201222-P00001
formula with respect to state ν is defined as follows.
1. ν
Figure US10872187-20201222-P00061
θ1˜θ2iff[θ1 v ]˜[θ2 v for ˜∈]{=≤, <, ≥, >}
2. ν
Figure US10872187-20201222-P00061
φΛΦiff ν
Figure US10872187-20201222-P00061
Φ and ν
Figure US10872187-20201222-P00061
ψ, accordingly for —, V,→⇄
3. ν
Figure US10872187-20201222-P00061
∀x φ iff ω
Figure US10872187-20201222-P00061
Φ for all ω that agree with v except for the value of x
4. ν
Figure US10872187-20201222-P00061
∃xΦiff ω
Figure US10872187-20201222-P00061
Φ for some ω that agrees with ν except for the value of x
5. ν
Figure US10872187-20201222-P00061
[α]Φ iff ω
Figure US10872187-20201222-P00061
Φ∀ω with (ν, ω) ∈ρ(α)
6. ν
Figure US10872187-20201222-P00061
[α]Φ iff w
Figure US10872187-20201222-P00061
∃w with (ν, ω)∈ρ(α)
We write |= Φ to denote that Φ is valid, i.e., that v |=Φ∀v.
A.2 Soundness
We recall Lemma 1.
Lemma 1 (Loop prior and posterior state). Let α be a hybrid program and α* be the program that repeats α arbitrarily many times. Assume that all consecutive pairs of states (vi−1, Vi) ∈ρ(α) of n ∈
Figure US10872187-20201222-P00092
+ executions, whose valuations are recalled with YV i
Figure US10872187-20201222-P00093
xVx=xi and Y V i−1 are plausible w.r.t. the model α, i.e., |=
Figure US10872187-20201222-P00094
1≤i≤n(YV i−1
Figure US10872187-20201222-P00095
α
Figure US10872187-20201222-P00096
YV i) with YV =YV 0 and YV +=YV n. Then, the sequence of states originates from an α* execution from YV 0 to YV n, i.e., |=YV
Figure US10872187-20201222-P00097
α*
Figure US10872187-20201222-P00098
YV +.
Proof. Follows directly from the transition semantics of α*: ρ(α*) =
Figure US10872187-20201222-P00099
where αi+1≅(α; αi) and α0 ≅? true.
We recall Theorem 1.
Theorem 1 (Model monitor correctness). Let α* be provably safe, so |=Φ→[α*]ψ. Let Vm=BV (α) ∪ FV (ψ). Let v0, v1, v2, v3 . . . ∈
Figure US10872187-20201222-P00100
n be a sequence of states, with v0
Figure US10872187-20201222-P00101
Φ and that agree on Σ/Vm, i.e.,
Figure US10872187-20201222-P00102
0|Σ/V m =
Figure US10872187-20201222-P00103
k|Σ/V m for all k. We define (
Figure US10872187-20201222-P00104
,
Figure US10872187-20201222-P00105
i+1)
Figure US10872187-20201222-P00106
xm as xm evaluated in the state resulting from
Figure US10872187-20201222-P00107
by interpreting x+ as
Figure US10872187-20201222-P00107
i+1(x) for all x ∈ Vm, i.e.,
Figure US10872187-20201222-P00108
x + v i+1(x)
Figure US10872187-20201222-P00109
xm. If
Figure US10872187-20201222-P00110
i,
Figure US10872187-20201222-P00111
i+1)
Figure US10872187-20201222-P00112
xm for all i< n then we have
Figure US10872187-20201222-P00113
n
Figure US10872187-20201222-P00114
where
X m≡(Φ|const
Figure US10872187-20201222-P00115
α
Figure US10872187-20201222-P00116
YV m +)  (3)
and Φ|const denotes the conditions of Φ that involve only constants that do not change in α, i.e., FV (Φ|const) ∩BV(α)=ø.
Proof. By induction over n. If n=0 then (
Figure US10872187-20201222-P00117
0,
Figure US10872187-20201222-P00118
0) ∈ρ(α*)trivially by definition of ρ and
Figure US10872187-20201222-P00119
Φ→[α*]ψ implies
Figure US10872187-20201222-P00120
0
Figure US10872187-20201222-P00121
ψ. For n>0 assume (
Figure US10872187-20201222-P00122
0,
Figure US10872187-20201222-P00123
n) |ρ(α*) and (
Figure US10872187-20201222-P00124
n,
Figure US10872187-20201222-P00125
n+1)
Figure US10872187-20201222-P00126
Figure US10872187-20201222-P00081
α
Figure US10872187-20201222-P00082
Λx∈V m x=x+. Then there exists μ such that (vn + v n+1(x) , μ) ∈ρ(α) and the two states agree on all variables except the ones modified by α, i.e., vn x + v n+1(x) |Σ/BV(α=μ|Σ/BB(α). Thus, μ
Figure US10872187-20201222-P00127
YV m +, i.e. μ
Figure US10872187-20201222-P00128
Figure US10872187-20201222-P00129
x∈V m x=x+, which in turn yields μ(x)=μ(x+)=(vn x + v n+1(x) (x+)=vn+1(x) (in other words, μ|Vm=vn+1|Vm). Since also vn|Σ/V m we get μ=
Figure US10872187-20201222-P00130
n+1 and (
Figure US10872187-20201222-P00131
n,
Figure US10872187-20201222-P00132
n+1) ∈ρ(α). Hence (
Figure US10872187-20201222-P00133
0,
Figure US10872187-20201222-P00134
n+1) ∈ρ(α*) because by induction hypothesis (
Figure US10872187-20201222-P00135
0,
Figure US10872187-20201222-P00136
n) ∈ρ(α*) and we conclude
Figure US10872187-20201222-P00137
n+1
Figure US10872187-20201222-P00138
ψ by assumption
Figure US10872187-20201222-P00139
Φ→[α]ψ using
Figure US10872187-20201222-P00140
0
Figure US10872187-20201222-P00141
Φ.
We recall Theorem 2.
Theorem 2 (Controller monitor correctness). Let α of the canonical form αctrl; αplant. Assume
Figure US10872187-20201222-P00142
Φ→[α*]ψ has been proven with invariant φ as in (1). Let
Figure US10872187-20201222-P00143
Φ|const
Figure US10872187-20201222-P00144
ψ, as checked by xm (Theorem 1). Furthermore, let
Figure US10872187-20201222-P00145
be a post-controller state. If (v,
Figure US10872187-20201222-P00146
)
Figure US10872187-20201222-P00147
Xc with Xc≡Φ|const
Figure US10872187-20201222-P00148
αctrl
Figure US10872187-20201222-P00149
YV c + = then we have that (v,
Figure US10872187-20201222-P00150
) ∈ρ(αctrl) and
Figure US10872187-20201222-P00151
Figure US10872187-20201222-P00152
φ.
Proof. Consider a state
Figure US10872187-20201222-P00153
Φ|const
Figure US10872187-20201222-P00154
φ. Assume (v,
Figure US10872187-20201222-P00155
)
Figure US10872187-20201222-P00156
Xc, i.e.,
Figure US10872187-20201222-P00157
Xc. Then there exists μ such that
Figure US10872187-20201222-P00158
, μ) ∈ρ(αctrl) and the two states agree on all variables except the ones modified by αctrl, i.e.,
Figure US10872187-20201222-P00159
|Σ/BVctrl))=μ|Σ/BVctrl). Thus
Figure US10872187-20201222-P00061
YV c +, i.e., μ|=
Figure US10872187-20201222-P00160
xeV c x=x+, which in turn yields μ(x)=μ(x+)=
Figure US10872187-20201222-P00161
(x+)=
Figure US10872187-20201222-P00162
(x) (in other words, μ|Vc=
Figure US10872187-20201222-P00163
Vc). Since also μ|Σ.V c =
Figure US10872187-20201222-P00164
Σ/V c we get μ=
Figure US10872187-20201222-P00165
and (v,
Figure US10872187-20201222-P00166
) ∈ρ(αctrl). Then we have
Figure US10872187-20201222-P00167
φ because by assumption φ→[αctrlplant]φ ρ(αplant) is reflexive as ODE can evolve for time 0.
We recall Theorem 3.
Theorem 3 (Prediction monitor correctness). Let α* be provably safe, i.e.,
Figure US10872187-20201222-P00168
Φ→[α*]ψ has been proved using invariant φ as in (1.) Let Vp=BV(α) ∪FV([α]φ). Let
Figure US10872187-20201222-P00169
Φ|const
Figure US10872187-20201222-P00170
φ, as checked by Xm from Theorem 1. Further assume
Figure US10872187-20201222-P00171
such that (
Figure US10872187-20201222-P00172
,
Figure US10872187-20201222-P00173
) ∈ρ(αctrl), as checked by Xc from Theorem 2. If (
Figure US10872187-20201222-P00174
,
Figure US10872187-20201222-P00175
)
Figure US10872187-20201222-P00176
Xp with Xp≡(Φ|const
Figure US10872187-20201222-P00177
φ) →
Figure US10872187-20201222-P00178
αctrl
Figure US10872187-20201222-P00179
YV p +
Figure US10872187-20201222-P00180
δplant]φ), then we have for all (
Figure US10872187-20201222-P00181
,w) ∈ρ(αδplant) that w
Figure US10872187-20201222-P00182
φ.
Proof. Consider a state
Figure US10872187-20201222-P00183
such that
Figure US10872187-20201222-P00184
Φ|xonst
Figure US10872187-20201222-P00185
φ. Let
Figure US10872187-20201222-P00186
be some state such that (
Figure US10872187-20201222-P00187
,
Figure US10872187-20201222-P00188
) ∈ρ(αctrl). Then we have
Figure US10872187-20201222-P00189
φ because by assumption φ→[αctrl; αplant]φ and ρ(αδplant) is reflexive as ODE can evolve for time 0. Furthermore
Figure US10872187-20201222-P00190
Φ|const since
Figure US10872187-20201222-P00191
|Σ/BVctrl)=
Figure US10872187-20201222-P00192
|Σ/BVctrl) and FV(Φ|const) ∩BV(αctrl) =ø. Assume (
Figure US10872187-20201222-P00193
,
Figure US10872187-20201222-P00194
)
Figure US10872187-20201222-P00195
Xp, i.e.,
Figure US10872187-20201222-P00196
Xp. Then there exists μ such that μ
Figure US10872187-20201222-P00197
YV p +
Figure US10872187-20201222-P00198
δplant]φ with (
Figure US10872187-20201222-P00199
, μ) ∈ρ(αctrl) and the two states agree on all variables except the ones modified by αctrl, i.e.,
Figure US10872187-20201222-P00200
|Σ/BVctrl)=μ|Σ/BVctrl). Thus μ(x)=μ(x+)=
Figure US10872187-20201222-P00201
(x+)=
Figure US10872187-20201222-P00202
(x). (in other words, μ|Vp=
Figure US10872187-20201222-P00203
|Vp). However, from Xp we know that μ
Figure US10872187-20201222-P00204
δplant]φ. Thus, by the coincidence lemma,
Figure US10872187-20201222-P00205
δplant]φ since FV ([αδplant]φ) Vp and hence we have w
Figure US10872187-20201222-P00206
φ for all (
Figure US10872187-20201222-P00207
,w) ∈ρ(αδplant).
Observe that this is also true for all intermediate times ç∈[0, ω(t)] by the transition semantics of differential equations, where ω(t)≤∈ because αδplant is bounded by ∈.
A.3 Decidability and Computability
From Lemma 1 it follows that online monitoring (i.e., monitoring the last two consecutive states) is permissible. So, ModelPlex turns questions [α*]Φ and
Figure US10872187-20201222-P00208
a*
Figure US10872187-20201222-P00209
Φ into [α]Φ and
Figure US10872187-20201222-P00210
α
Figure US10872187-20201222-P00211
Φ, respectively. For decidability, we first consider canonical hybrid programs α of the form α≡αctrl; αplant where αctrl and αplant are free of further nested loops.
We split Theorem 4 (decidability and computability) into Theorem 5 (decidability) and Theorem 6 (computability) and prove them separately. To handle differential inequalities in
Figure US10872187-20201222-P00001
formulas of the form [αδplant]Φ, the subsequent proofs additionally assume the rules for handling differential-algebraic equations in the
Figure US10872187-20201222-P00001
calculus.
Theorem 5 (Monitor correctness is decidable). Monitor correctness is decidable for canonical models of the form α≡αctrl; αplant without nested loops, with solvable differential equations in αplant and disturbed plans αδplant with constant additive disturbance δ i.e., Xm
Figure US10872187-20201222-P00212
α
Figure US10872187-20201222-P00213
YV +,Xc
Figure US10872187-20201222-P00214
αctrl
Figure US10872187-20201222-P00215
YV +, and Xp
Figure US10872187-20201222-P00216
α
Figure US10872187-20201222-P00217
YV +
Figure US10872187-20201222-P00218
δplant]Φ) are decidable.
Proof. From relative decidability of
Figure US10872187-20201222-P00219
(i.e.,
Figure US10872187-20201222-P00220
formulas without free variables) are decidable relative to an oracle for discrete loop invariants/variants and continuous differential invariants/variants. Since neither αctrl nor αplant contain nested loops, we manage without an oracle for loop invariants/variants. Further, since the differential equation systems in αplant are solvable, we have an effective oracle for differential invariants/variants. Let Cl(Φ) denote the universal closure of
Figure US10872187-20201222-P00221
formula Φ (i.e., Cl(Φ)≡∀z∈FV(Φ)z. Φ). Note that when
Figure US10872187-20201222-P00222
F then also
Figure US10872187-20201222-P00223
Cl(F) by a standard argument.
Model monitor Xm
Figure US10872187-20201222-P00224
α
Figure US10872187-20201222-P00225
YV +: Follows from relative decidability of
Figure US10872187-20201222-P00226
, because Cl(Xm
Figure US10872187-20201222-P00227
α
Figure US10872187-20201222-P00228
YV +) contains no free variables.
Controller monitor Xc
Figure US10872187-20201222-P00229
αctrl
Figure US10872187-20201222-P00230
YV +: Follows from relative decidability of
Figure US10872187-20201222-P00231
, because Cl(Xc
Figure US10872187-20201222-P00232
αctrl
Figure US10872187-20201222-P00233
YV +) contains no free variables.
Prediction monitor Xp
Figure US10872187-20201222-P00234
αctrl
Figure US10872187-20201222-P00235
(YV +
Figure US10872187-20201222-P00236
δplant]Φ):-Decidability for αctrl follows from case Xc
Figure US10872187-20201222-P00237
αctrl
Figure US10872187-20201222-P00238
YV + (controller monitor) above. It remains to show decidability of Xp
Figure US10872187-20201222-P00239
αctrl
Figure US10872187-20201222-P00240
δplant]Φ, which by decidability of the controller monitor is (Xp
Figure US10872187-20201222-P00241
YV +)→[αplant]Φ. Since the disturbance δ in αδplant is constant additive and the differential equations in αplant are solvable, we have the disturbance functions f(θ,δ) and g(θ,δ) applied to the solution as an oracle (By design, the disturbed plant αδplant also includes a clock x0, so the oracle additionally includes the trivial differential invariant x0≥0) for differential invariants (i. e., the differential invariant is a pipe around the solution without disturbance). Specifically, to show (Xp
Figure US10872187-20201222-P00242
YV +)→[αδplant]Φ by Def. 2 we have to show (XpΛYV +)→[x0:=0; {θ−δ≤x′≤θ+δ&H Λx0 ≤ε}]Φ We proceed with only (XpΛYV +) →[x0:=0{x′≤θ+δ&H Λx0≤ε}]Φ p since the case θ−δ≤x′ follows in a similar manner. By definition of αδplant we know 0≤x0, and hence continue with (XpΛYV +)→[{x′≤θ+δ&HΛ0≤x0≤ε}]Φ by differential cut 0≤x0. Using the differential cut rule, we further supply the oracle solx+δx0, where solx denotes the solution of x′=θ in αplant and δx0 the solution for the disturbance since δ is constant additive. This leads to two proof obligations:
Prove oracle (XpΛYV +)→[x′≤θ+δ&0≤x0≤ε]x≤solx+δx0, which by rule differential invariant is valid if we can show 0≤x0≤ε→x′≤sol′x+(δx0)′ where the primed variables are replaced with the respective right-hand side of the differential equation system. From Def. 2 we know that x′0=1 and δ′=0 and since solx is the solution of x′=θ in αplant we further know that sol′x=θ; hence we have to show 0≤x0≤ε→θ+δ≤θ+δ, which is trivially true.
Use oracle (XpΛYV +)→[x′≤θ+δ&HΛ0≤x0≤εΛx≤solx+δx0]φ, which by rule differential weaken is valid if we can show
(X p ΛY V +)→∀α(( HΛ0≤x 0≤εΛx≤solx +δx 0)→Φ)
where ∀α denotes the universal closure w.r.t. x, i. e., ∀x. But, if Xp is a correct monitor, this is provable by quantifier elimination. Furthermore, we cannot get a better result than differential weaken, because the evolution domain constraint contains the oracle's answer for the differential equation system, which characterizes exactly the reachable set of the differential equation system.
We conclude that the oracle is proven correct and its usage is decidable.
For computability, we start with a theoretical proof on the basis of decidability, before we give a constructive proof, which is more useful in practice.
Theorem 6 (Monitor synthesis is computable). Synthesis of Xm, Xc, and Xp monitors is computable for canonical models of the form α≡αctrl; αplant without nested loops, with solvable differential equations in αplant and plants αδplant with constant additive disturbance δ, i. e., synthm:
Figure US10872187-20201222-P00243
α
Figure US10872187-20201222-P00244
YV +→Xm, synthc:
Figure US10872187-20201222-P00245
αctrl
Figure US10872187-20201222-P00246
YV +→Xc, and synthp:
Figure US10872187-20201222-P00247
α
Figure US10872187-20201222-P00248
(YV +
Figure US10872187-20201222-P00249
plant]Φ)→Xp are computable.
Proof. Follows immediately from Theorem 5 with recursive enumeration of monitors.
We give a constructive proof of Theorem 6. The proof is based on the observation that, except for loop and differential invariants/variants, rule application in the
Figure US10872187-20201222-P00250
calculus is deterministic: we know that, relative to an oracle for first-order invariants and variants, the
Figure US10872187-20201222-P00251
calculus gives a semidecision-procedure for
Figure US10872187-20201222-P00252
formulas with differential equations having first-order definable flows.
Proof. For the sake of a contradiction, suppose that monitor synthesis stopped with some open sequent not being a first-order quantifier-free formula. Then, the open sequent either contains a hybrid program with nondeterministic repetition or a differential equation at top level, or it is not quantifier-free. But this contradicts our assumption that both αctrl and αplant are free from loops and that the differential equations are solvable and disturbance is constant, in which case for
Model monitor synthesis Xm: the solution rule
Figure US10872187-20201222-P00253
Figure US10872187-20201222-P00254
would make progress, because the differential equations in αplant are solvable; and for
Prediction monitor synthesis Xp: the disturbance functions f(θ,δ) and g(θ,δ) applied to the solution provide differential invariants (see proof of Theorem 5) so that the differential cut rule, the differential invariant rule, and the differential weakening rule would make progress.
In the case of the open sequent not being quantifier-free, the quantifier elimination rule QE would be applicable and turn the formula including quantifiers into an equivalent quantifier-free formula. Hence, the open sequent neither contains nondeterministic repetition, nor a differential equation, nor a quantifier. Thus we conclude that the open sequent is a first-order quantifier-free formula.
B. Water Tank Monitor Specification Conjecture Analysis
Proof 1 shows a complete sequence of proof rules applied to the water tank specification conjecture of Example 2 on page 7, with Φ≡ε>0 and Y+≡x=x+Λf =f+Λt =t+.
( Λ r ) Γ ϕ , Γ ψ , Δ Γ ϕ ψ , Δ ( Wr ) Γ Δ Γ ϕ , Δ ( QE ) QE ( ϕ ) 1 ϕ ( ; ) α β ϕ α ; β ϕ ( ? ) H ψ ? H ψ ( := ) ϕ x θ x := θ ϕ ( * ) X x := X ϕ 2 x := * ϕ ( ) t 0 ( ( 0 t _ t x := y ( t _ ) H ) x := y * ( t ) ϕ ) 3 x = θ & H ϕ ( r ) Γ ϕ ( θ ) , x ϕ ( x ) , Δ 4 Γ x ϕ ( x ) , Δ ( i ) Γ X ( Λ i ( Φ i ψ i ) ) , Δ 5 Γ , Φ 1 ψ 1 , Δ⋯ Γ , Φ n ψ n , Δ ( σ ) ϕ x θ x ( x = θ ϕ ( x ) )
1 iff Φ≡QE(Φ), Φ is a first order real arithmetic formula, QE)(Φ) is a quantifier free formula
2 X is a new logical variable p 3 t and {tilde over (t)} are fresh logical variables and
Figure US10872187-20201222-P00255
x:=y(t)
Figure US10872187-20201222-P00256
is the discrete assignment belonging to the solution y of the differential equation with constant symbol x as symbolic initial value
4 θ is an arbitrary term, often a new (existential) logistical variable X.
5 Among all open branches, free logical variable X only occurs in the branches Γ, Φ, ├ψ, Δ
Figure US10872187-20201222-C00004
Proof 1. Analysis of the water tank monitor specification conjecture (plant is an abbreviation for x′=f, t′=1 & x≥0
Figure US10872187-20201222-P00257
t≤ε)
Proof 1: Analysis of the water tank monitor specification conjecture (plant is an abbreviation for x′=f, t′=1 & x ≥0
Figure US10872187-20201222-P00258
t≤ ε)
B. 1 Monitoring in the Presence of Expected Uncertainty and Disturbance Example 7
We start at the point where we have to handle the differential inequalities. First, we eliminate the differential inequalities by rephrasing them as differential-algebraic constraints in step (DE). Then, we refine by instantiating the existential quantifiers with the worst-case evolution in step (DR). The resulting differential equation has polynomial solutions and, thus, we can use
Figure US10872187-20201222-P00259
Figure US10872187-20201222-P00260
and proceed with the proof as before.
Figure US10872187-20201222-C00005
As expected, we get a more permissive monitor specification. One conjunct of the monitor specification is shown in (Xm1) Such a monitor specification says that there exists a real flow F, a real time T, and a real level Xs, such that the measured flow f+, the clock t+, and the measured level x+ can be explained with the model.
C. Monitor Synthesis and Fallback Controller Design C.1 Design-By-Contract Monitoring
Preconditions, postconditions and invariants are crucial conditions in CPS design. Monitors for these conditions can check (i) whether or not it is safe to start a particular controller (i. e., check that the precondition of a controller is satisfied), (ii) whether or not a controller complies with its specification (i. e., check that a controller delivers set values that satisfy its post condition), and (iii) whether or not the system is still within its safety bounds (i. e., check that the loop invariant of α* is satisfied).
Precondition and post condition monitors are useful to decide whether or not it is safe to invoke a controller in the current state, and whether or not to trust a controller output. An invariant monitor of a CPS α* captures the main assumptions that have to be true throughout system execution. When an invariant monitor is unsatisfied, it may no longer be safe to run the CPS; a fail-safe controller can act as a mitigation strategy.
Design-by-contract monitors are useful to monitor specific design decisions, which are explicitly marked in the model. Our approach systematically creates monitors for a complete specification of the behavior of the model.
C.2 Monitor Synthesis
Once we found a model monitor, controller monitor, or prediction monitor specification, we want to turn it into an actual monitor implementation (e. g., in C). The main challenge is to reliably transfer the monitor specification, which is evaluated on
Figure US10872187-20201222-P00261
, into executable code that uses floating point representations. We use the interval arithmetic library Apron to represent each real arithmetic value with an interval of a pair of floating point numbers. The interval reliably contains the real.
For certification purposes one still has to argue for the correctness of the actual machine code of the synthesized monitor. This entails that the transformation from the monitor specification as a first-order formula into actual code that evaluates the formula must be formally verified. If the synthesized code is still a high-level language, a certified compiler, can be used to produce machine code. Such a comprehensive proof chain suitable for certification is part of our ongoing research.
C.3 Designing for a Fail-Safe Fallback Controller
When we design a system for a fail-safe fallback controller ctrlsafe, it is important to know within which bounds the fail-safe controller can still keep our CPS safe, and which design limits we want a controller implementation to obey. The invariant of a CPS with the fail-safe fallback controller describes the safety bounds. When we start the fail-safe fallback controller ctrlsafe in a state where its invariant G is satisfied, it will guarantee to keep the CPS in a state that satisfies the safety property ψ.
So, to safely operate an experimental controller ctrlexp, we want a monitor that informs us when the experimental controller can no longer guarantee the invariant of the fail-safe controller or when it is about to violate the design limits.
A design for a CPS with a fail-safe fallback controller, therefore, involves proving two properties. First, we prove that the fail-safe controller ctrlsafe ensures the safety property ψ as in formula (4) below. This property is only provable if we discover an invariant G for the CPS with the fail-safe controller. Then we use G as the safety condition for generating a prediction monitor.
ø→[(ctrlsafe;plant)*@inv(G)]ψ
With this generic structure in mind, we can design for a fallback controller invoked by a model monitor Xm, controller monitor Xc, or prediction monitor Xp. Upon violation of either Xm, Xc, or Xp by the actual system execution, the set values of a fail-safe controller are used instead.
D. Monitor Synthesis Algorithm
Algorithm 1 lists the ModelPlex specification conjecture analysis algorithm 106, which turns a specification conjecture into an actual monitor, and is shown in flow-chart form in FIG. 4. The algorithm takes a hybrid system model α, a set of variables V that we want to monitor, and an initial condition ø including constraints on the variables not changed in α. (Usually, we want a monitor for all the bound variables of the hybrid system model, i.e., V=BV (α).
Algorithm 1: ModelPlex monitor synthesis
input: A hybrid program α, a set of variables V BV (α), an initial condition ϕ such
that |= ϕ → [α*] ψ,
output: A monitor Xm such that |= Xm ≡ ϕ|const
Figure US10872187-20201222-P00262
α 
Figure US10872187-20201222-P00263
r+.
begin S ← ∅
γ+
Figure US10872187-20201222-P00264
x∈vx = x+ with fresh variables xi +
  / / Monitor conjecture
G ← {├ ϕ|const
Figure US10872187-20201222-P00262
α
Figure US10872187-20201222-P00263
γ+}
1 while G ≠ ∅ do / / Analyze monitor conjecture
foreach g ∈ G do
 G ← G − {g}
 if g is first-order then
  if |≠ g then S ← S ∪ {g}
 else
  {tilde over (g)} ← apply dL proof rule to g
  G ← G ∪ {{tilde over (g)}}
Xm
Figure US10872187-20201222-P00264
s∈Ss
 / / Collect open sequents
E. Simulation
To illustrate the behavior of the water tank model with a fallback controller, we created two monitors: Monitor Xm validates the complete model (as in the examples throughout this work) and is executed at the beginning of each control cycle (before the controller runs). Monitor Xc validates only the controller of the model α (compares prior and post state of f:=*; ?
- 1 f m - x ɛ )
the controiier but before control actions are issued. Thus, monitor Xc resembles conventional runtime verification approaches, which do not check CPS behavior for compliance with the complete hybrid model. This way, we detect unexpected deviations from the model at the beginning of each control cycle, while we detect unsafe control actions immediately before they are taken. With only monitor Xm in place we would require an additional control cycle to detect unsafe control action, whereas with only monitor Xc in place we would miss deviations from the model. Note that we could run monitor Xm in place of Xc to achieve the same effect. But monitor Xm implements a more complicated formula, which is unnecessary when only the controller output should be validated.
FIG. 2 shows a plot of the variable traces of one simulation run. In the simulation, we ran the pump controller every 2 s (ε=2 s, indicated by the grid for the abscissa and the marks on sensor and actuator plots). The controller was set to pump with
5 ( m - x 0 ) ɛ = 5 2
for the first three controller cycles, which is unsafe on the third controller cycle. Monitor B immediately detects this violation at t=4, because on the third controller cycle setting
f = 5 2
violates
f m - x 1 ɛ .
The fail-safe action at t=4 drains the tank and, after that, normal operation continues until t=12. Unexpected disturbance
x = f + 1 20
occurs throughout t=[12,14], which is detected by monitor Xm. Note, that such a deviation would remain undetected with conventional approaches (monitor Xc is completely unaware of the deviation). In this simulation run, the disturbance is small enough to let the fail-safe action at t=14 keep the water tank in a safe state.

Claims (20)

We claim:
1. A computer-implemented method for synthesizing a monitor for a cyber-physical system (CPS) from a verified model of the CPS, the verified model expressed as a set of mathematical formulas, comprising the steps of:
deriving a monitor specification from the verified model, the monitor specification comprising a set of specification conjectures, each specification conjecture derived from one of the set of mathematical formulas by verified transformation such that each specification conjecture is satisfied over states of the CPS only if the states are compatible with behavior of the verified model;
applying a theorem prover to each specification conjecture to derive one or more monitor conditions expressed as first-order logic by performing logical transformations that successively simplify formulas into structurally simpler formulas expressing effects of the verified model behavior;
synthesizing the monitor by syntactic transformation or compilation of the monitor conditions to executable code that verifies the monitor conditions; and
verifying the behavior of the CPS by executing the monitor to determine that the CPS meets the set of monitor conditions indicating compliance with the verified model;
wherein the CPS includes a controller running control software, the controller reading sensors and controlling actuators, and wherein the monitor verifies the actions of the controller and resulting changes in a state of the CPS.
2. The method of claim 1 further comprising the step of executing the monitor in conjunction with the control software, to guarantee compliance of the CPS with the verified model.
3. The method of claim 1 where the monitor consists of a model monitor, a controller monitor and a prediction monitor.
4. The method of claim 3 wherein the model monitor compares a current state of the CPS with a previous state of he CPS and determines if any differences between the current state and the previous state are in compliance with the verified model.
5. The method of claim 3 wherein the controller monitor monitors the controller to check compliance with the verified model.
6. The method of claim 3 wherein the prediction monitor allows deviations of the cyber-physical system from the verified model to account for real-world imperfections.
7. The method of claim 4 wherein the model monitor, the controller monitor and the prediction monitor read the sensors to determine the current state of the CPS.
8. The method of claim 7 wherein the model monitor runs prior to the control software and determines if physical behavior which occurred between the previous state and the current state is in compliance with the verified model.
9. The method of claim 8 wherein the model monitor will raise an error if any differences between the current state and the previous state are not in compliance with the verified model.
10. The method of claim 5 wherein the controller monitor runs after the control software and determines if physical actions to be taken by the controller will result in the CPS being in compliance with the verified model.
11. The method of claim 10 wherein the controller monitor will raise an error if the physical actions will result in the CPS not being in compliance with the verified model.
12. The method of claim 6 wherein the prediction monitor runs after the control software and determines if physical actions to be taken by the controller will result in the CPS being in compliance with the verified model in the presence of bounded deviations between the CPS and the verified model.
13. The method of claim 12 wherein the prediction monitor will raise an error if the physical actions to be taken by the controller will result in the CPS not being in compliance with the verified model.
14. The method of claim 1 wherein the verified model comprises a set of formulas of the form:

Φ→[α*]ψ with invariant ψ→[α]ψ s.t. Φ→φ and φ→ψ  (1)
where:
Φ is a precondition for the run;
α* describes repeated runs of the hybrid system;
α is the hybrid system model;
ψ is a postcondition for the run; and
φ is a loop invariant.
15. The method of claim 8 wherein compliance with the model monitor guarantees that properties of the verified model are present in the CPS before the control software is executed.
16. The method of claim 10 wherein compliance with the controller monitor guarantees that properties of the verified model are present in the CPS after the control software is executed.
17. The method of claim 12 wherein compliance with the prediction monitor guarantees that properties of the verified model will still be present in future states of the CPS.
18. The method of claim 1 wherein the method is automated in accordance with an algorithm.
19. The method of claim 1 wherein the mathematical formulas are differential dynamic logic formulas.
20. The method of claim 3, wherein the prediction monitor predicts a next state of the CPS based on the actions to be taken by the controller and initiates failsafe actions if the next state of the CPS deviates from the verified model.
US15/026,690 2013-10-11 2014-10-10 Verified runtime validation of verified cyber-physical system models Active 2037-08-28 US10872187B2 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
US15/026,690 US10872187B2 (en) 2013-10-11 2014-10-10 Verified runtime validation of verified cyber-physical system models

Applications Claiming Priority (4)

Application Number Priority Date Filing Date Title
US201361961366P 2013-10-11 2013-10-11
US201461999318P 2014-07-23 2014-07-23
PCT/US2014/060019 WO2015102717A2 (en) 2013-10-11 2014-10-10 Verified runtime validation of verified cyber-physical system models
US15/026,690 US10872187B2 (en) 2013-10-11 2014-10-10 Verified runtime validation of verified cyber-physical system models

Related Parent Applications (1)

Application Number Title Priority Date Filing Date
PCT/US2014/060019 A-371-Of-International WO2015102717A2 (en) 2013-10-11 2014-10-10 Verified runtime validation of verified cyber-physical system models

Related Child Applications (1)

Application Number Title Priority Date Filing Date
US16/685,099 Continuation-In-Part US11204838B2 (en) 2013-10-11 2019-11-15 Runtime model validation for partially-observable hybrid systems

Publications (2)

Publication Number Publication Date
US20160253437A1 US20160253437A1 (en) 2016-09-01
US10872187B2 true US10872187B2 (en) 2020-12-22

Family

ID=53494196

Family Applications (1)

Application Number Title Priority Date Filing Date
US15/026,690 Active 2037-08-28 US10872187B2 (en) 2013-10-11 2014-10-10 Verified runtime validation of verified cyber-physical system models

Country Status (2)

Country Link
US (1) US10872187B2 (en)
WO (1) WO2015102717A2 (en)

Families Citing this family (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10152596B2 (en) * 2016-01-19 2018-12-11 International Business Machines Corporation Detecting anomalous events through runtime verification of software execution using a behavioral model
US10262143B2 (en) 2016-09-13 2019-04-16 The Mitre Corporation System and method for modeling and analyzing the impact of cyber-security events on cyber-physical systems
US20220044148A1 (en) * 2018-10-15 2022-02-10 Koninklijke Philips N.V. Adapting prediction models
WO2020231334A1 (en) * 2019-05-10 2020-11-19 Singapore University Of Technology And Design Modelling and black-box security testing of cyber-physical systems
US11467575B2 (en) 2019-06-27 2022-10-11 Toyota Motor Engineering & Manufacturing North America, Inc. Systems and methods for safety-aware training of AI-based control systems
CN111932828A (en) * 2019-11-05 2020-11-13 上海中侨健康智能科技有限公司 Intelligent old-age care monitoring and early warning system based on digital twin technology

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6289502B1 (en) 1997-09-26 2001-09-11 Massachusetts Institute Of Technology Model-based software design and validation
US20110295578A1 (en) * 2010-05-27 2011-12-01 The Mathworks, Inc. Partitioning block diagrams into executable contextual models
US20120017119A1 (en) 2010-07-16 2012-01-19 Fujitsu Limited Solving Hybrid Constraints to Generate Test Cases for Validating a Software Module

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6289502B1 (en) 1997-09-26 2001-09-11 Massachusetts Institute Of Technology Model-based software design and validation
US20110295578A1 (en) * 2010-05-27 2011-12-01 The Mathworks, Inc. Partitioning block diagrams into executable contextual models
US20120017119A1 (en) 2010-07-16 2012-01-19 Fujitsu Limited Solving Hybrid Constraints to Generate Test Cases for Validating a Software Module

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
Bartocci, et al., Adaptive Runtime Verification, 2012 Runtime Verification Conf., Sep. 25-28, 2012.
Tan, et al., Testing and Monitoring Model-Based Generated Program, U. Penn Scholarly Commons, Jul. 13, 2003. *
Zouaghi, et al., Monitoring of Hybrid Systems Using Behavioral System Specification, IFAC World Congress, Aug. 28-Sep. 2, 2011. *

Also Published As

Publication number Publication date
WO2015102717A2 (en) 2015-07-09
US20160253437A1 (en) 2016-09-01
WO2015102717A3 (en) 2015-08-27

Similar Documents

Publication Publication Date Title
US10872187B2 (en) Verified runtime validation of verified cyber-physical system models
Mitsch et al. ModelPlex: Verified runtime validation of verified cyber-physical system models
Katoen Concepts, algorithms, and tools for model checking
Larsen et al. Statistical model checking: past, present, and future
Santhanam et al. Dominance testing via model checking
Zhang et al. Effective interactive resolution of static analysis alarms
Todorov et al. Formal verification of automotive embedded software
Cook et al. Disproving termination with overapproximation
Post et al. Linking functional requirements and software verification
Johnson The increasing risks of risk assessment: On the rise of artificial intelligence and non-determinism in safety-critical systems
Filieri et al. Quantification of software changes through probabilistic symbolic execution (N)
JP2024507532A (en) Systems and methods for determining program code defects and acceptability of use
US11204838B2 (en) Runtime model validation for partially-observable hybrid systems
Mansoor et al. A method for backward failure propagation in conceptual system design
Selvaraj et al. On how to not prove faulty controllers safe in differential dynamic logic
Alrajeh et al. Risk-driven revision of requirements models
Scheerer et al. Reliability prediction of self-adaptive systems managing uncertain ai black-box components
Zaatiti et al. Counterexample-Guided Abstraction-Refinement for Hybrid Systems Diagnosability Analysis.
Kuter et al. HACKAR: helpful advice for code knowledge and attack resilience
JP7433510B2 (en) Methods, storage media, computer programs, and processing circuits for verifying implementation of security policies
Ortega-Cabezas et al. Application of Rule-Based Expert Systems and Dynamic-Link Libraries to Enhance Hardware-in-The-Loop Simulation Results.
Beckert et al. Reasoning about vote counting schemes using light-weight and heavy-weight methods
Kittelmann A Maneuver-Centric Formal Engineering Approach for Cyber-Physical Systems
Pecheur et al. Formal verification of autonomy models
Gomez et al. Using Online Model Checking Technique for Survivability, Evaluating Different Scenarios on Runtime

Legal Events

Date Code Title Description
AS Assignment

Owner name: CARNEGIE MELLON UNIVERSITY, PENNSYLVANIA

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:MITSCH, STEFAN;PLATZER, ANDRE;SIGNING DATES FROM 20160701 TO 20160728;REEL/FRAME:039282/0530

STPP Information on status: patent application and granting procedure in general

Free format text: NON FINAL ACTION MAILED

STPP Information on status: patent application and granting procedure in general

Free format text: RESPONSE TO NON-FINAL OFFICE ACTION ENTERED AND FORWARDED TO EXAMINER

STPP Information on status: patent application and granting procedure in general

Free format text: FINAL REJECTION MAILED

STPP Information on status: patent application and granting procedure in general

Free format text: DOCKETED NEW CASE - READY FOR EXAMINATION

STPP Information on status: patent application and granting procedure in general

Free format text: NON FINAL ACTION MAILED

STPP Information on status: patent application and granting procedure in general

Free format text: NOTICE OF ALLOWANCE MAILED -- APPLICATION RECEIVED IN OFFICE OF PUBLICATIONS

STPP Information on status: patent application and granting procedure in general

Free format text: PUBLICATIONS -- ISSUE FEE PAYMENT RECEIVED

STPP Information on status: patent application and granting procedure in general

Free format text: PUBLICATIONS -- ISSUE FEE PAYMENT VERIFIED

STPP Information on status: patent application and granting procedure in general

Free format text: PUBLICATIONS -- ISSUE FEE PAYMENT VERIFIED

STCF Information on status: patent grant

Free format text: PATENTED CASE

CC Certificate of correction
CC Certificate of correction